www.nettime.org
Nettime mailing list archives

<nettime> TBTF for 1999-05-08: Netopath
dawson {AT} world.std.com (Keith Dawson) (by way of ) on Sun, 9 May 1999 04:07:24 +0200 (CEST)


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

<nettime> TBTF for 1999-05-08: Netopath


     [orig To: <tbtf {AT} tbtf.com>]

-----BEGIN PGP SIGNED MESSAGE-----

TBTF for 1999-05-08: Netopath

    T a s t y   B i t s   f r o m   t h e   T e c h n o l o g y   F r o n t

    Timely news of the bellwethers in computer and communications
    technology that will affect electronic commerce -- since 1994

    Your Host: Keith Dawson

    This issue: < http://tbtf.com/archive/1999-05-08.html >
    ________________________________________________________________________

C o n t e n t s

    Intercepting communications worldwide
    An advance in factoring: Shamir's TWINKLE
    Bernstein wins appeal
    Stunning Australian censorship proposal could become law
    Talk of US-mandated disabled access to Web pages is premature
    Electronic ink debuts
    Siliconia: the e-Coast
    Snailmail for the Internet age
    Web logs
    The world through an eBay lens
        eBayla
        Car dealer accused of libeling a competitor
        Auctioning an ISP team
        13-year-old bids $3M, thinking it's a game
    Jargon Scout: Netopath
    ________________________________________________________________________

..Intercepting communications worldwide

  Secret group founded by the FBI pushes international data monitoring

    The CALEA law in the US, an Australian regulation requiring tapping
    of telecomms, and a secret EU policy position are all traceable dir-
    ectly to the efforts of a secret international group of law enforce-
    ment officers -- called ILETS -- convened by the FBI and meeting
    since 1993 to push building universal wiretap-ability into worldwide
    communications. Duncan Campbell reports for the Guardian and Observer
    [1] (cookies required).

    The existence and operation of the ILETS group is but one subject
    covered in the report "Interception Capabilities 2000," which Camp-
    bell authored for the European Parliament's Science and Technology
    Options Assessment Panel. IC2000 was approved as a working document
    at the STOA meeting in Strasbourg on 1999-05-06. It is available
    here [2]. (The text downloads 332K. Turn off graphics to avoid an-
    other 761K; the graphics add little to the article.)

    Today your email, Web browsing, online chat, telex, phone calls,
    cell calls, and faxes are almost certainly being swept up in one
    or more national or international interception dragnets. Unless you
    routinely use PGP, or communicate over a robust encrypted VPN link,
    these communications can be read by unaccountable agencies in any
    one of a growing number of countries.

    Does this fact make you angry? Then encrypt.

    [1]  http://www.newsunlimited.co.uk/The_Paper/Weekly/Story/0,3605,45981,00.html
    [2]  http://www.gn.apc.org/duncan/ic2000.htm
    ____________

..An advance in factoring: Shamir's TWINKLE

  Opto-electronic sieving challenges 512-bit PGP keys

    Adi Shamir, one of the inventors of RSA, has made a major advance in
    the factoring of large numbers [3] (free registration and cookies
    required for this NY Times story). The new work describes hardware
    that, if constructed, might put the routine factoring of 150-digit
    numbers more easily within reach. This would mean that 512-bit RSA
    keys (for example) would be vulnerable to cracking with modest re-
    sources.

    Details of Shamir's approach have been posted on the RSA Labs site
    [4]. Shamir's paper is also available in PostScript (370K) [5] or
    Zip (79K) [6] form.

    Shamir proposes a fast piece of sieving hardware dubbed TWINKLE that
    could be built for about $5000 in volume. He roughly specs a photo-
    electric sieving device 100 to 1000 times faster than a typical PC
    for this task. Such devices are not new -- D.H. Lehmer built a mech-
    anical-optical sieve in the 1930's. The RSA site claims that Sha-
    mir's device would requires some sophisticated optical/electrical
    engineering to implement, but that it does appear feasible.

    [3]  http://www.nytimes.com/library/tech/99/05/biztech/articles/02encr.html
    [4]  http://www.rsa.com/rsalabs/html/twinkle_qa.html
    [5]  http://jya.com/twinkle.eps
    [6]  http://jya.com/twinkle.zip
    ____________

..Bernstein wins appeal

  Court decides, 3-2, that US encryption export laws are unconstitu-
  tional when applied to source code

    A three-judge panel for the US 9th Circuit of Appeals has ruled that
    the source code for Daniel Bernstein's crypto program "Snuffle" is
    speech protected under the First Amendment. The ruling affirms a
    lower-court decision issued a year and a half ago [7], before the
    control of crypto exports was moved from the State Department to
    Commerce. The ruling did not provide Bernstein with injunctive re-
    lief to publish his code pending the expected appeal by the Justice
    Department to the Supreme Court.

    Here is the ruling itself [8], authored by Judge Betty Fletcher;
    below are some excerpts.

      > Cryptographers use source code to express their scientific
      > ideas in much the same way that mathematicians use equations
      > or economists use graphs

      > We find that the export administration regulations operate
      > as a prepublication licensing scheme that burdens scientific
      > expression, vest boundless discretion in government offi-
      > cials, and lack adequate procedural safeguards.

      > We emphasize the narrowness of our First Amendment holding.
      > We do not hold that all software is expressive. Much of it
      > surely is not... We hold merely that because the prepubli-
      > cation licensing regime challenged here applies directly to
      > scientific expression, vests boundless discretion in govern-
      > ment officials, and lacks adequate procedural safeguards,
      > it constitutes an impermissible prior restraint on speech.

      > Whether we are surveiled by our government, by criminals,
      > or by our neighbors, it is fair to say that never has our
      > ability to shield our affairs from prying eyes been at such
      > a low ebb. The availability and use of secure encryption may
      > offer an opportunity to reclaim some portion of the privacy
      > we have lost. Government efforts to control encryption thus
      > may well implicate not only the First Amendment rights of
      > cryptographers intent on pushing the boundaries of their
      > science, but also the constitutional rights of each of us as
      > potential recipients of encryption's bounty. Viewed from
      > this perspective, the government's efforts to retard pro-
      > gress in cryptography may implicate the Fourth Amendment, as
      > well as the right to speak anonymously..., the right against
      > compelled speech..., and the right to informational privacy...

      > The government's argument suggests that even one drop of
      > "direct functionality" overwhelms any constitutional protec-
      > tions that expression might otherwise enjoy. This cannot be
      > so. If it were, we would have expected the Supreme Court to
      > start and end its analysis of David Paul O'Brien's burning
      > of his draft card with an inquiry into whether he was kept
      > warm by the ensuing flames.

    In light of the ruling some in the crypto community are calling for
    the immediate posting of cryptographically sensitive materials from
    US shores. Some examples are the interrnational Cryptography Freedom
    page [9] and the original source code for Snuffle itself [10]. But
    Cindy Cohn, one of the victorious lawyers, strikes a note of caution
    [11]: it would be wiser to wait 52 days before setting up a crypto
    redistribution repository in the US, even from the 6-state area
    under the purview of the 9th Circuit Court.

    Thanks to the TBTF Irregular David Black for his usual astute reading
    of legal prose.

    [7]  http://tbtf.com/archive/1996-12-24.html#s01
    [8]  http://jya.com/bernstein-9th.htm
    [9]  http://jya.com/crypto-free.htm
    [10] http://www.shmoo.com/~pablos/Snuffle/snuffle.shar
    [11] http://www.ljx.com/mailinglists/cyberia-l/20266.html
    ____________

..Stunning Australian censorship proposal could become law

  Advice of technical experts and government panels is ignored

    TBTF Irregular [12] Eric Scheid <eric at ironclad dot net dot au>
    has been feeding me material on a drastic swing to the right
    being played out now in Australia. Proposed legislation would out-
    law any Net content in that country down to an "R" rating and would
    compel ISPs to block all such material worldwide from Australian
    viewers. The SJ Mercury News's Dan Gillmor says [13]:

      > As Australia's government races headlong toward a regime of
      > Internet censorship, a visitor from the United States is
      > tempted to ridicule the notion and the politicians who are
      > responsible. But I find myself more saddened than smug as I
      > look at the proposed bill.

    Here are some salient points from the proposed legislation that
    sounds more suitable to a brutal dictatorship than to an en-
    lightened Western society, from a posting by Kimberley Heitman,
    Chair of Electronic Frontier Australia:

      > First new feature is the licencing of ISPs, and compulsory
      > trade unionism ... Daily penalties of $27,500 should be
      > enough to bring small ISPs into line, if the threat of being
      > shut down by the Federal Court doesn't.

      > Second, the ABA will... tell ISPs what hardware and software
      > to use. Oh, and from now on ISPs work weekends, as takedown
      > orders issued by email or fax will have to be complied-with
      > within 24 hours. Same penalties natch -- $27,500 daily for
      > merely allowing "adult themes" material.

      > Third, people can complain about ISPs as well as sites, for
      > permitting access to "adult themes" material anywhere in the
      > world... Is there any doubt that proxy filters are to be
      > compulsory?

      > Fourth, less censorious State and Territory laws are over-
      > ridden, and no-one under 18 is allowed to own an account.
      > Free speech is dead coast to coast...

      > And finally, everything archiveable is covered, not just web
      > sites. As technology improves, the industry and the public
      > will pay for smaller and smaller sieves down to the RAM
      > caches, IRC, and newsgroups.

      > There's no pretence in this Bill that self-regulation means
      > anything other than outsourcing censorship.

    This extremely disturbing story is still developing; you can fol-
    low the news on the Link mailing list [14] (search for Alston, Har-
    radine, censorship). Here are some links to resources provided by
    Eric Scheid.

     - The government proposals [15]

     - EFA's response [16]

     - A large law firm's take on the proposed legislation [17]

     - Senator Alston's latest media release [18]

     - Links to discussion and analysis of the bill [19]

    [12] http://tbtf.com/the-irregulars.html
    [13] http://www.mercurycenter.com/svtech/columns/gillmor/docs/dg050499.htm
    [14] http://www.anu.edu.au/mail-archives/link/
    [15] http://www.dcita.gov.au/nsapi-text/?MIval=dca_dispdoc&pathid=3648
    [16] http://www.efa.org.au/Publish/PR990319.html
    [17] http://www.gtlaw.com.au/pubs/newdarkage.html
    [18] http://www.dcita.gov.au/nsapi-text/?MIval=dca_dispdoc&pathid=3756
    [19] http://www.efa.org.au/Campaigns/99.html
     ____________

..Talk of US-mandated disabled access to Web pages is premature

  Freedom Forum story is much reported and overblown

    A little-noted law passed last year requires the Web sites of gov-
    ernment agencies, and of anyone who supplies Web deliverables to
    the government, to meet criteria for accessibility for people with
    disabilities. Adam Clayton Powell III has touched off a broad de-
    bate with a story [20] that projects dire consequences from this
    simple and sensible law. The accessibility provision is contained
    in Section 508 [21] of the Workforce Investment Act, passed last
    year by Congress. While the law is mandatory only for government
    sites and for contractors that provide Web content to the govern-
    ment, Powell quotes some members of the committee responsible for
    writing the rules as they speculate on the (to them presumably
    desirable) possibility that all US-based Web sites may some day
    come under the force of such rules. In a Ziff Davis interview [22],
    Jenifer Simpson, a member of the rules committee, justified such
    unprecedented government intervention in a publishing medium this
    way:

      > The Internet is subject to market forces, but it didn't start
      > through market forces, it was started by the federal government.

    She was certainly speaking out of school. The Supreme Court has
    ruled, in striking down parts of the Communications Decency Act,
    that the Internet is a medium deserving of the strongest First
    Amendment protections.

    A poster to the fight-censorship mailing list summarized thus the
    universal government tendency to give us a fat 3-ring binder when
    what we need is a paragraph:

      > Given the reasonably sane goal of assuring that all taxpaying
      > citizens, regardless of their physical condition, have access to

      > what they've paid for, one might (if one were not a government
      > employee) expect something like:

      > "All data posted to the web by the government shall include
      > 'alt' tags in any graphics. The government shall design web
      > pages to conform with the capabilities of leading tools for
      > the handicapped, save where such conformance defeats the pur-
      > pose of the site."

      > Of course, that's not what we got.

    Thanks to the TBTF Irregulars, in particular Jamie McCarthy and
    David Black, for perspective and editorial balance on this story.
    McCarthy has written an analysis [23] concluding that the Freedom
    Forum story is irresponsible journalism and calling for a retrac-
    tion. Powell is sticking by his viewpoint.

    [20] http://www.freedomforum.org/technology/1999/4/30handicapaccess.asp
    [21] http://www.usdoj.gov/crt/508/508law.html
    [22] http://www.msnbc.com/news/260652.asp
    [23] http://truman.fac.org/forum/messagedetail.asp?msgID=16678
    ____________

..Electronic ink debuts

  "Immedia" technology promises real electronic books, someday

    E Ink [24], a Cambridge company, promises flat-panel displays that
    can be printed on any surface, moving us one step closer to the ad-
    vertising-saturated world of Neal Stephenson's Snow Crash [25]. The
    first commercial installation of its Immedia technology in an ad-
    vertising panel [26] has been unveiled in the sports department of a
    J.C.Penney store in a Boston exurb (photo [27], 61K). Area geeks have
    been making the pilgrimage to the Solomon Pond Mall in Marlboro,
    Massachusetts to marvel at a 4-by-6-foot (1.3-by-2 meter) display,
    3mm thick, featuring a miniature wireless device by which store em-
    ployees can update it every 10 seconds. The display uses less than
    100 watts of energy.

    [24] http://www.electronic-ink.com/
    [25] http://www.amazon.com/exec/obidos/ASIN/0553562614/tbtf
    [26] http://www.electronic-ink.com/releases/pr7.html
    [27] http://www.electronic-ink.com/images/jcp_1.jpg
    ____________

..Siliconia: the e-Coast

  Portsmouth, NH is the latest soon-to-be-hot tech area

    Portsmouth, New Hampshire is the latest region to hold a naming con-
    test and launch a branding program to boost its recognition as a
    technology center. The resulting Siliconium [28] is "e-Coast," des-
    ignating the 18-mile NH seacoast and adjacent areas of Massachusetts
    and Maine. It's too bad the Boston Globe headline writer chose to
    title its story [29] "Silicon Seacoast." Anchoring Portsmouth's
    vibrant and growing high-tech scene is venture-backed Bow Street
    Software, with killer office space on the Piscataqua River where the
    famous tugboats tie up [30]. Unfortunately I can't tell you what Bow
    Street does: their Web site [31] is too high-tech for my Communica-
    tor 4.51 browser. It presents a black-on-black window with a few
    rollovers; the link to a text-only version leads back to the same
    inaccessible site.
    
    Thanks to Aaron Smith <a dot smith at rscs dot net> of the Greater
    Portsmouth Chamber of Commerce for word on the e-Coast.

    [28] http://tbtf.com/siliconia.html
    [29] http://www.boston.com/dailyglobe2/125/business/Silicon_seacoast%2b.shtml
    [30] http://www.tugboatalley.com/index1.htm
    [31] http://bowstreet.com/
    ____________

..Snailmail for the Internet age

  Bridging email to a more venerable medium

    A new company [32] formed by an Irish e-commerce expert promises to
    turn Net surfers into letter writers. Letterpost is the brainchild
    of Dr. Donal O'Mahony of Trinity College in Dublin. While on sab-
    batical at Stanford he decided to partake of the local customs and
    create his own Internet startup. Here's how it works. You buy post-
    age at [32], 99 cents per letter, and type the recipient's address
    and your message. The letter is printed out, put in an envelope,
    and mailed from one of Letterpost.com's automated mail centers. The
    first such center is operational in San Francisco; Ireland will
    open in May and India in June. The company will be targeting US
    immigrant groups such as Irish-Americans and first- and second-
    generation Indians, helping them to keep in touch with unwired rel-
    atives back home.

    TBTF Irregular John R. LoVerso <loverso at sitaranetworks dot com>
    writes:

      > What's old is new again. Back in '82, the US Postal Service had
      > an (ummm, forgot the correct term) "electronic telegram" ser-
      > vice. This was when they were asking Congress to allow them to
      > control electronic mail delivery. Anyway, one enterprising soul
      > made a UUCP-to-egram gateway. You had to UUCP mail (foo!bar!-
      > another!there) the letter in an exacting format, but it ended
      > up getting printed and mailed. I used it several times. Like
      > all things in "the good old days" of the net, it was free.

    Reader Prasenjeet Dutta <pd at cse dot vec dot ac dot in> notes:

      > A company called Multinet Infosys [33] has been offering a free
      > letterpost service in India at for quite some time now. They'll
      > send letters to anywhere in India for free, although they do ask
      > you to register.

    [32] http://www.letterpost.com/
    [33] http://www.homeindia.com/post/main.htm
    ____________

..Web logs

  Going public with your filtered browsing

    If you've missed the Web log phenomenon, allow me to introduce you.
    For some years Web adepts have been posting daily commentary on and
    links to sites they find compelling; the first Web log may have been
    NCSA's What's New page [34]. Suddenly Web logs are legion. Leslie Har-
    pold comments on the phenomenon in Smug [35]:

      > I love riffing through a good log, it's kind of the vicar-
      > ious voyeuristic thrill picking through someone else's purse
      > or junk drawer, but I'm fairly certain there's more than
      > enough dull stuff on the web, so no need to add to the pile.
      > If Web Logs become as ubiquitous as the cargo pant, the
      > stylishness and cache will be wholly depleted and it will be
      > gone faster than the wrap sandwich.

    Here are some of the Web logs I find most useful to the topics TBTF
    covers:

      - Rafe Colburn -- Outraged Daily Edition [36]

      - Wesley Felter -- Hack the Planet [37]

      - Raphael Carter -- Honeyguide [38] (his Sonnets on Science [39]
        aren't bad either)

      - Jesse James Garrett -- Infosift [40]

      - Lawrence Lee -- Tomalak's Realm [41]

    Some consider TBTF's Tasty Bit of the Day feature a Web log, but
    that's a stretch. The TBoDay is considerably more cooked than the
    items in most Web logs; it's a first draft for a regular TBTF item.
    But a growing acquaintance with Web logs has moved me to make TBTF
    available in "push" form to Dave Winer's Userland [42], a sort of
    toolkit for constructing your own personal meta-log.

    [34] http://www.ncsa.uiuc.edu/SDG/Software/Mosaic/Docs/old-whats-new/whats-new-0693.html
    [35] http://www.smug.com/current/net.html
    [36] http://rc3.org/">rafe
    [37] http://hack-the-planet.felter.org/
    [38] http://www.chaparraltree.com/honeyguide/
    [39] http://www.chaparraltree.com/scison/
    [40] http://www.jjg.net/infosift/
    [41] http://tr.pair.com/
    [42] http://my.userland.com/
   ____________

..The world through an eBay lens

    The eBay auction site is now about the size of the 1994 Internet and
    I would wager it is growing as fast. Auction is one of the killer
    apps of the Net today. eBay presents us with various analogies to
    the early Net: it's large, shambling, nearly unmanageable; it's
    fast-moving, rough-and-tumble, and very American. For weeks now Web
    watchers have been passing around eBay URLs, pointing to auctions in
    progress or completed, as bellwethers of coming trends. Here are a
    few.
    ____________

    ..eBayla

    Canadian security enthusiast Tom Cervenka, who goes by the handle
    Blue Adept, has invented a new flavor of virus: he has created an
    infected eBay auction item [43] that he calls eBayla. The exploit
    works because eBay allows JavaScript in the member-authored pages
    describing an item offered for sale. When an eBay member bids on
    an infected item, his/her username and password are emailed to
    Cervenka. EBay's response [44] to the exploit sets a new low for
    bone-headedness. Not only does eBay downplay the seriousness of
    the security hole; not only do they get the technical details of
    the exploit's workings wrong; but they also make vague threats in
    Cervenka's direction, because he brought this vulnerability to
    their attention. EBay deserves to get slapped, hard, by its mem-
    bers -- nothing else will make them rethink their cluelessness.
    Thanks to Michael Sanders <msanders at confusion dot net> for the
    prod on this story.

    [43] http://www.because-we-can.com/ebayla/default.htm
    [44] http://www.news.com/News/Item/Textonly/0,25,35321,00.html
    ____________

    ..Car dealer accused of libeling a competitor

    A popular feature of the eBay site allows users to rate their en-
    counters with other site users. This forum provides some reputation
    accountability: both bidders and sellers can check out others' ex-
    periences with eBay users and choose whether to do business with
    them. eBay doesn't monitor, adjudicate, or characterize the posted
    comments. Recently a vendor of automobiles, new to eBay, watched
    several bidders withdraw their bids after someone posted negative
    comments about the dealer [45], [46]. With little difficulty the
    dealer traced the negative postings to employees of a rival firm
    operating on eBay.

    [45] http://www.washingtonpost.com/wp-srv/business/feed/biztop925293980763.htm
    [46] http://abcnews.go.com/sections/tech/DailyNews/ebay990408.html
    ____________

    ..Auctioning an ISP team

    Sixteen system administrators, developers, and managers from a "major
    ISP" tried to auction themselves off on eBay [47]. The minimum bid was
    set above $3.1M, which would give the purchaser use of the team for
    one year -- and provide the team members with healthy raises. It is
    unclear if anyone actually bid for this "item" on eBay, but team
    members said in an interview that [48] several companies had con-
    tacted them. Thanks to TBTF Irregular Eric Scheid <eric at ironclad
    dot net dot au> for the tip.

	[47] http://cgi.ebay.com/aw-cgi/eBayISAPI.dll?ViewItem&item=96369441
    [48] http://www.washingtonpost.com/wp-srv/business/daily/april99/ebay30.htm
    ____________

    ..13-year-old bids $3M, thinking it's a game

    13-year-old Andrew Tyler's parents were surprised when an eBay rep-
    resentative contacted them and asked how Andrew intended to pay
    $900,000 for a Van Gogh painting he had won at auction [49]. The
    teenager had also bid on a 1955 Ford convertible, an antique bed,
    a Viking ship replica, and a Superman comic book.

    [49] http://www.usatoday.com/life/cyber/tech/ctf027.htm
    ____________

..Jargon Scout: Netopath

  What to call a pathological Net abuser

    Jargon Scout [50] is an irregular TBTF feature that aims to give you
    advance warning -- preferably before Wired Magazine picks it up --
    of jargon that is just about ready to hatch into the Net's language.
    Spam fighter JoWazzoo <jowazzoo at whiteice dot com> takes credit
    for coining the term "netopath," which is applied to the most ex-
    treme and deranged form of Net abuser. The Usenet posting in which
    JoWazzoo coined the term (7952fe$ggl {AT} chronicle.concentric.net) has
    expired from the archives of both Deja News and Alta Vista, but this
    immediate followup post [51], which references and quotes it, ce-
    ments JoWazzoo's claim to the invention.

    [50] http://tbtf.com/jargon-scout.html
    [51] http://ww2.altavista.com/cgi-bin/news?msg {AT} 266119 {AT} news%2eadmin%2enet%2dabuse%2eemail%267952fe+ggl+chronicle+concentric+net
    ________________________________________________________________________

N o t e s

> TBTF has been slashdotted [52]. The link [53] to the eBayla story
    above resulted in 6667 visitors on 1999-04-21 (1000 would have been
    normal) and 126K hits (vs. a normal 15K). The bandwidth bill has
    come due and it is not pretty, not that I'm complaining.

    [52] http://www.tuxedo.org/~esr/jargon/frames/slashdoteffect.html
    [53] http://slashdot.org/articles/99/04/22/1816245.shtml

> Some readers took exception to my use of the Jive dialect in the pre-
    vious issue's title story. Upon reflection I should have chosen
    another example. Apologies and no offense intended.
    ________________________________________________________________________

S o u r c e s

> For a complete list of TBTF's (mostly email) sources, see
    http://tbtf.com/sources.html .
    ________________________________________________________________________

    TBTF home and archive at http://tbtf.com/ . To (un)subscribe send
    the message "(un)subscribe" to tbtf-request {AT} tbtf.com. TBTF is Copy-
    right 1994-1999 by Keith Dawson, <dawson {AT} world.std.com>. Commercial
    use prohibited. For non-commercial purposes please forward, post,
    and link as you see fit.
    _______________________________________________
    Keith Dawson               dawson {AT} world.std.com
    Layer of ash separates morning and evening milk.

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5

iQCVAwUBNzSfBGAMawgf2iXRAQFQdwQAvI1HDmYZCV3kCIV/loMH7V1G0mD/SVGy
jF2UlhPu6vPBaYpxXnciSoW4zcFdTOjua6EhrZr+uD4IWMMrk2GUAQEOD4NlyOHh
Jy7AEKvfAMmE0fVcb/woGPYkgIVbbiEbuCzrTFevMiJuRQ7gKR/qqlZodJqgzkko
aITtPqAMJ7o=
=mepb
-----END PGP SIGNATURE-----

---
#  distributed via nettime-l : no commercial use without permission
#  <nettime> is a closed moderated mailinglist for net criticism,
#  collaborative text filtering and cultural politics of the nets
#  more info: majordomo {AT} desk.nl and "info nettime-l" in the msg body
#  URL: http://www.desk.nl/~nettime/  contact: nettime-owner {AT} desk.nl