EFFECTOR ONLINE vol 1 #6

 ########## |   Volume I                               Number 6   |

########## |                                                     |

###        |                   EFFECTOR ONLINE                   |

#######    |                                                     |

#######    |                    In this issue:                   |

###        |              NetNews: The EFF Wants You!            |

########## |            Computers and Academic Freedom           |

########## | All I Really Need to Know I Learned from my Computer|

           |         The Prodigy Saga Marches On...and On        |

########## |                 S.266: What You Can Do              |

########## |              -==--==--==-<:>-==--==--==-            |

###        |                        Editors:                     |

#######    |            Gerard Van der Leun (van@eff.org)        |

#######    |             Mike Godwin (mnemonic@eff.org)          |

###        |             Mitchell Kapor (mkapor@eff.org)         |

###        |                    Managing Editors:                |

###        |Chris Davis (ckd@eff.org), Helen Rose (hrose@eff.org)|

           |                                                     |

########## |       Reproduction of Effector Online via all       |

########## |            electronic media is encouraged..         |

###        |      To reproduce signed articles individually      |

#######    |    please contact the authors for their express     |

#######    |                     permission..                    |

###        |                                                     |

###        |             Published Fortnightly by                |

###        |    The Electronic Frontier Foundation (eff.org)     |

                                                                  

effector n, Computer Sci. A device for producing a desired change.

                        -==--==--==-<>-==--==--==-


                                FAST BREAKS:

                    Net News from the Electronic Frontier


THE EFF WANTS YOU

    After many months, the EFF has received its 501(c)3 Federal tax

exemption.  This means that membership in, and donations to,

the EFF are fully tax-deductible.

    For over a year, we have been funding the work of this 

organization through the generosity of a few individuals who

believe in our mission and our goals.  Now we are able to open

the EFF to people from all our various constituencies throughout

the world.

   As a result, we would like to ask all of you who support us

to become members.

   To sustain our current goals and programs, and expand our

efforts will take the commitment of time and money on the part

of many people and institutions from all areas of our society.

    We will be raising funds in the near future from a variety

of sources, but without the concrete support of individuals

like you, we cannot pursue and achieve our goals of assuring that

Constitutional protections are extended to online media.  Without your

support we can't effectively advocate policy changes on the federal

and state level.  Without you, we can't continue to effectively pursue

the education of the general public as to the benefits of online media

and the potential of the National Public Network of the future.

Nor can we continue to effectively defend the rights of those wrongly

accused.

    Pioneer membership rates are $20.00 per year for students 

and low-income supporters, $40.00 per year for regular members.

We are currently working on an institutional membership program.

    The way this works is simple. We are going to be assembling all

the detritus of joining an organization: tidy forms, lots of 

check-boxes, payment via Visa or Mastercard, and all the fancy stuff

you've learned to expect from well-meaning organizations over the 

years.  But you can cut to the chase right now and just mail a check. 

    And, yes, we are going to be handing out numbers. This means low

numbers will have a certain cachet with those who value such

things.  And if you don't care, you'll still have the knowledge

that you've helped us move forward this year and in the future.

    Member Privacy Policy: The EFF will never sell any names or

information about its members. We will, from time to time, share

consenting members names with other non-profit organizations which

we are certain will advance the shared causes and goals of the EFF.

But, even then, we will only share your name if you consent to it.

This means you have to state that you grant us the privilege of

sharing your name. You can revoke this at any time. If you do not

actively grant us this permission, we will assume that you wish

your membership to be absolutely confidential.

    You can send your membership fees and/or your additional 

donation to The Electronic Frontier Foundation, 155 Second Street,

Cambridge, MA 02141. Please include your name, postal address, and

electronic mail address.


THE EFF AND SENATE BILL 266

    At the EFF we continue to oppose the spirit and the letter of

those provisions of Senate Bill 266 that would require mandatory

cooperation of telecommunications providers with law enforcement.

    We believe that those individuals and organizations that support

this initiative fail to understand the implications of compromising 

encryption methods in this time of emergent online technologies.

    In order to play an active role in shaping this legislation

the EFF expects to meet with the bill's sponsors in Washington 

and express our fundamental opposition to any move on the part 

of the Federal government that would prohibit or have a chilling

effect on the individual's right to use cryptography.


THE CPSR ANNOUNCES A WASHINGTON WORKSHOP 

ON PRIVACY, ENCRYPTION, AND TELECOMMUNICATIONS POLICY

     Computer Professionals for Social Responsibility, the

Electronic Frontier Foundation, RSA are sponsoring a one-day 

workshop in Washington, D.C. on June 10.

     This workshop will bring together a broad coalition of

professionals in the computer and telecommunications fields,

as well as experts in cutting-edge cryptography, privacy 

advocates, and civil liberties protectors.  It will feature

a congressional briefing on current federal policy initiatives

including S.266 and export restrictions.

     The workshop will be followed at 2:00 by a press conference

and the National Press Club (14th & Pennsylvania Avenue N.W.). All

interested parties are invited to attend the press conference.


                -==--==--==-<>-==--==--==-


EFF DOCUMENT FILES NOW AVAILABLE

    THE DOCUMENT CASE -- a collection of briefs, judgements

white papers, rulings, and references of moment to the issues 

of law and order on The Electronic Frontier--is now available via

FTP at eff.org. This represents our current and expanding collection

of legal papers of interest to attorneys and the net at large. It

was created and maintained by Staff Counsel Mike Godwin 

(mnemonic@eff.org).  For details on how to access this archive

please contact ftphelp@eff.org.

   To add to the archive, send mail to Michael Godwin (mnemonic@eff.org).

 

               -==--==--==-<>-==--==--==-


COMPUTERS AND ACADEMIC FREEDOM GROUPS NOW AT EFF.ORG

    CAF discusses such questions as : How should general principles

of academic freedom (such as freedom of expression, freedom to read,

due process, and privacy) be applied to university computers and

networks? How are these principles actually being applied? How can the

principles of academic freedom as applied to computers and networks be

defended?

    The EFF has given the discussion a home on the eff.org machine.

As of April 23, less than two week after its creation, the list has

230 members in four countries.

    There are three versions of the mailing list:

comp-academic-freedom-talk

        - you'll received dozens of e-mail notes every day.

comp-academic-freedom-batch

        - about once a day, you'll receive a compilation of the day's notes.

comp-academic-freedom-news

        - about once a week you'll receive a compilation of the best

          notes of the week. (I play the editor for this one).

    To join a version of the list, send mail to listserv@eff.org. 

Include the line "add <name-of-version>". (Other commands are "delete

<name-of-version>" and "help").

    In any case, after you join the list you can send e-mail to the 

LIST BY addressing it to caf-talk@eff.org.

    These mailing lists are also available as the USENET alt groups

'alt.comp.acad-freedom.talk' and 'alt.comp.acad-freedom.news'.


              -==--==--==-<>-==--==--==-


                  the sand remembers

           once there was beach and sunshine

                   but chip is warm too


               -==--==--==-<>-==--==--==-


    The Need for a Discussion of Computers and Academic Freedom

              by Carl Kadie (kadie@eff.org)


   When my grandmother attended the University of Illinois fifty-five

years ago, academic freedom meant the right to speak up in class, to

created student organizations, to listen to controversial speakers, to

read "dangerous" books in the library, and to be protected from random

searches of your dorm room.

   Today these rights are guaranteed by most universities. These days,

however, my academic life very different from my grandmother's. Her

academic life was centered on the classroom and the student union.

Mine centers on the computer and the computer network. In the new

academia, my academic freedom is much less secure.

   The suppression of academic freedom on computers is common. At least

once a month, someone posts on plea on Usenet for help. The most

common complaint is that a newsgroup has been banned because of its

content (usually alt.sex). In January, a sysadmin at the University of

Wisconsin didn't ban any newsgroups directly. Instead, he reduced the

newsgroup expiration time so that reading groups such as alt.sex is

almost impossible. Last month, a sysadmin at Case Western killed

a note that a student had posted to a local newsgroup.  The sysadmin

said the information in the note could be misused. In other cases,

university employees may be reading e-mail or looking through user

files. This may happen with or without some prior notice that e-mail

and files are fair game.

   In many of these cases the legality of the suppression is unclear. It

may depend on user expectation, prior announcements, and whether the

university is public or private.

   The legality is, however, irrelevant. The duty of the University is

not to suppress everything it legally can; rather it is to support the

free and open investigation and expression of ideas. This is the ideal

of academic freedom. In this role, the University acts a model of how

the wider world should be. (In the world of computers, universities are

perhaps the most important model of how things should be).

   If you are interested in discussing this issues, or if you have

first-hand experience with academic suppression on computers or

networks, please join the mailing list.


            -==--==--==-<>-==--==--==-


               one with nintendo

               halcyon symbiosis

             hand thinks for itself


            -==--==--==-<>-==--==--==-


        All I Really Need to Know I Learned from My Computer


All I really need to know about how to live and what to do and how to be I

learned right here in the CAEN labs. Illumination was not at the top of the

graduate school mountain, but right there in front of the computer

monitors. These are the things I learned. Everything you need to know is

here somewhere:


        1.      Share all your executables.

        2.      Pay for your shareware.

        3.      Don't hit the computer.

        4.      Back up files after you have found them.

        5.      Clean up your own messy desktop.

        6.      Don't copy software that is not yours.

        7.      Make a smiley when you send someone a nasty message.

        8.      Wash your hands before you type.

        9.      Flush your buffers.

        10.     M&Ms and a cold can of Coke are good for you.

        11.     Live a student's life--learn some and think some and

                MacDraw and IPaint and Readnews and play Tetris and hack

                every day some.

        12.     Take a break every two hours from staring at the terminal.

        13.     When you go out in the world, watch out for network traffic,

                hold connections and stick together.

        14.     Be aware of wonder. Remember the little bytes in the chip:

                The code goes in and the graphics come out and nobody

                really knows how or why, but computers are all like that.

        15.     Pets and Lisas and DN350s and even the little bytes in the

                chip all die. So do we.

        16.     And then remember the Computer Reference Manuals and the

                first command you learned--the biggest command of all--Quit.


                                by Ann Gordon (anng@caen.engin.umich.edu)


                 -==--==--==-<>-==--==--==-


                       samurai fighter

               keyboard and mouse are his sword

                       digital battles


                 -==--==--==-<>-==--==--==-



              THE PRODIGY SAGA CONTINUED....REDUX....ENCORE....


[Prodigy continued to be a main subject of conversation on the net over

the past two weeks.  Here is a selection of one exchange of views on

comp.org.eff.talk.]

--

From: brad@looking.on.ca (Brad Templeton)


In article <14193.281F5781@fidogate.FIDONET.ORG> 

Tom.Jennings@f111.n125.z1.FIDONET.ORG (Tom Jennings) writes:

>It's easy to support free-speech issues on "safe" subjects 

>-- the real test is when it is an unpopular one, or even one

>you don't agree with.


I agree with this 100%.  It's one of the strongest parts of my personal

philosophy.


But this is not a free-speech issue, so it is not relevant.


People do not understand that freedom of the press (and Prodigy is press)

has two very important components:

     a) Nobody can tell you what not to print (freedom from censorship)

     b) Nobody can tell you what *to* print.  (editorial control)


Both are important.   To insist that Prodigy allow gay/lesbian discussion

against their will is not much different from forbidding them from having

gay/lesbian discussion if they want it.


Congress shall make no law abridging the freedom of the press.   That's no

law in *either* direction.


--


From: lee@wang.com (Lee Story)

In-Reply-To: brad@looking.on.ca's message of 4 May 91 


Well sorry, Brad, but it's not clear to many of us that a service like

Prodigy is self-evidently "press", as you seem to claim.  In the part

of the service which presents (publishes) advertisements (mostly!) and

Prodigy-initiated or Prodigy-contracted informative articles (rarely),

they would seem to deserve the same protections offered to the print

and broadcast media.


But in their provision of email service they would seem to be merely a

by-subscription carrier, and their unpleasant lack of interfaces to

other carriers does not disguise that fact.  I don't see why the same

protections offered to mail and telephone subscribers shouldn't apply.

And I don't see why bulletin boards to which subscribers are welcome to

contribute shouldn't be considered either (1) simply useful extensions

of email, or (2) publishing ventures, but ones in which the subscribers

are the publishers and Prodigy remains the carrier.


Isn't some scheme like this simple and fair enough to be worth

codifying as law, and the added marketability of email and bulletin

boards sufficient to encourage commercial services to provide them

even if they aren't allowed to control the contents?


(By the way, I think the trashy, ad-oriented nature of Prodigy has

encouraged many of us to criticize them for practices that would

raise few complaints on GEnie, CIS, etc.  They may be doing us a

real service.)

--

From: brad@looking.on.ca (Brad Templeton)


I have seen no proof of Prodigy doing anything but charge for their E-mail.

They are not press, but an E-mail provider, when it comes to E-mail.


But in all the public areas of the system, they are indeed press, and

have explicitly said and acted in such a fashion at all times as far as I

can tell.   I am not sure how other people have gotten any other impression.


Prodigy screens everything posted in the public areas.  It's 100% edited.

How can you consider them anything but press?

-- 

[The discussion continues in comp.org.eff.talk.]


            -==--==--==-<>-==--==--==-


                   DAT arrives

            frequency notch treachery

             people are not fooled


            -==--==--==-<>-==--==--==-



               S.266: WHAT YOU CAN DO


From: metzger@watson.ibm.com (Perry E. Metzger)


 [Editor's Note:After sending a letter to Biden's office protesting 

the language of S.266, Mr. Metzger received, as did many others, 

a form letter reply.In comp.org.eff.talk, this is what he did next.]


I actually bothered to follow up on my (identical) form letter from

Sen. Biden's office.


I spoke to John Bentivoglio, who is on the Senator's Judiciary

committee staff (not his personal staff), who claims to have been the

person who drafted the letter that went out on Joe Biden's signature.


He's more or less unmovable, though he is friendly.


He has already heard from lots and lots of people from the net about

this. His claim is more or less this: the stated section of the law is

intended more to get communications providers to help with the tapping

of things like Cellular Phones and the like, which he claims is now

difficult. (All of us on the net, of course, know you can tap a

cellular phone with a radio scanner and some patience, but never mind

that). He also claims that they understand that there are technical

reasons making the provisioning of back doors into cryptosystems

difficult, and that is the reason for the "sense of congress" thing.

He also claims that this is not the proverbial crack in the dike, and

that the Senator has no intention of following through with additional

legislation to enforce a ban on secure cryptosystems.


Personally, I have no idea whether to believe him. My gut says, never

trust a politico, and that he is trying to sell me a bridge. That's not

the part that matters, though. The part that matters is whether or not

we can still do something to stop this clause from getting through.


My suggestion is that we, the UseNetters, organize an attempt to get

S.266 Section 2201, and S.618 Section 545, discussed in a

congressional hearing.


My suggestion: Call up as many of the following Senators as you can.

(Maybe you can leave out Biden, he's probably useless at this point.)

Ask to speak to an actual human on their staff for a few minutes;

don't just register a complaint with a random bill. Say something like

"I'd like to speak to a member of the senators staff about a bill

coming before the Judiciary committee that I am very concerned about."

When you get someone, calmly and quietly tell them why you oppose

S.266 section 2201 and S.618 section 545. (the wording in both is

identical, and be sure to mention that the two sections are

identical). Explain to them that there are lots of other people who

think the same way and tell them you would like to see hearings held

where people who are members of prominent organizations like the

Electronic Freedom Foundation, the ACLU, and other similar groups

would be given a chance to oppose the section. Be nice; these men are

the ones who we have to count on to rescue us. (Gawd help us all!)


Here, again, is the text of what we are opposing, which is identical

in both S.266 sec. 2201 and S.618 sec. 545:


----------------------------------------------------------------------

COOPERATION OF TELECOMMUNICATIONS PROVIDERS WITH LAW ENFORCEMENT


It is the sense of Congress that providers of electronic communications

services and manufacturers of electronic communications service equipment

shall ensure that communications systems permit the government to obtain 

the plain text contents of voice, data, and other communications when

appropriately authorized by law.

----------------------------------------------------------------------


The members of the Senate Judiciary Committee, which will be acting on

these bills, are:


Chair: Joseph R. Biden, Delaware


Edward M. Kennedy, Massachusetts

Howard M. Metzenbaum, Ohio  

Dennis DeConcini, Arizona

Patrick J. Leahy, Vermont

Howell Heflin, Alabama

Paul Simon, Illinois

Herbert Kohl, Wisconsin

Strom Thurmond, South Carolina

Orrin G. Hatch, Utah

Alan K. Simpson, Wyoming

Charles E. Grassley, Iowa

Arlen Specter, Pennsylvania

Hank Brown, Colorado


The phone number of the U.S. Senate Switchboard, which will get you

any of these men's staff's, is...


(202)-224-3121


Their specific numbers and addresses are...


DEMOCRATS:


Senator Joseph Biden (Del)

Suite 221

Russell Building

U.S. Senate, Washington DC 20510 <-- for all of them

(202) 224-5042


Senator Edward Kennedy

Suite 315

Russell Building

(202) 224-4543


Senator Howard Metzenbaum (Ohio)

Suite 140

Russell

(202) 224-2315


Senator Dennis DeConcini (Arizona)

Suite 328

Russell

(202) 224-4521


Senator Patrick Leahy (Vermont)

Suite 433

Russell

(202) 224-4242


Senator Howell Heflin (Alabama)

Suite 728

Russell

(202) 224-4124


Senator Paul Simon (Illinois)

Suite 462

Dirksen Building

(202) 224-2152


Senator Herbert Kohl (Wisconsin)

Suite 702

Russell

(202) 224-5653


REPUBLICANS:


Senator Strom Thurmond (South Carolina)

Suite 218

Russell

(202) 224-5972


Senator Orrin Hatch (Utah)

Suite 135

Russell

(202) 224-5251


Senator Alan Simpson (Wyo)

Suite 261

Dirksen Bldg

(202) 224-3424


Senator Charles Grassley (Louisiana)

Suite 135

Hart Bldg

(202) 224-3744


Senator Arlen Specter (Pennsylvania)

Suite 303

Hart Bldg

(202) 224-4254


            -==--==--==-<>-==--==--==-


                oh no godzilla

        guns and planes cannot stop him

            tokyo is ablaze


            -==--==--==-<>-==--==--==-


COMPUTING & VALUES CONFERENCE, AUG 12-16


The National Conference on Computing and Values will convene August

12-16, 1991, in New Haven, CT.  N C C V / 91 is a project of the

National Science Foundation and the Research Center on Computing and

Society.  Specific themes (tracks) include


      -  Computer Privacy & Confidentiality

      -  Computer Security & Crime

      -  Ownership of Software & Intellectual Property

      -  Equity & Access to Computing Resources

      -  Teaching Computing & Values

      -  Policy Issues in the Campus Computing Environment


The workshop structure of the conference limits participation to

approximately 400 registrants, but space *IS* still available at this

time (mid-May).


Confirmed speakers include Ronald E. Anderson, Daniel Appleman, John

Perry Barlow, Tora Bikson, Della Bonnette, Leslie Burkholder, Terrell

Ward Bynum, David Carey, Jacques N.  Catudal, Gary Chapman, Marvin

Croy, Charles E. M.  Dunlop, Batya Friedman, Donald Gotterbarn,

Barbara Heinisch, Deborah Johnson, Mitch Kapor, John Ladd, Marianne

LaFrance, Ann-Marie Lancaster, Doris Lidtke, Walter Maner, Diane

Martin, Keith Miller, James H. Moor, William Hugh Murray, Peter

Neumann, George Nicholson, Helen Nissenbaum, Judith Perolle, Amy

Rubin, Sanford Sherizen, John Snapper, Richard Stallman, T. C. Ting,

Willis Ware, Terry Winograd, and Richard A. Wright.


The registration fee is low ($175) and deeply discounted air fares are

available into New Haven.


To request a registration packet, please send your name, your email AND

paper mail addresses to ...


   BITNet      MANER@BGSUOPIE.BITNET

   InterNet    maner@andy.bgsu.edu (129.1.1.2)

 

or, by fax ...


   (419) 372-8061

 

or, by phone ...


  (419) 372-8719  (answering machine)

  (419) 372-2337  (secretary)

 

or, by regular mail ...


   Professor Walter Maner

   Dept. of Computer Science

   Bowling Green State University

   Bowling Green, OH 43403 USA


USENIX EFF BOF UPDATE: TIME CHANGE


At the Summer 1991 USENIX Conference, being held in Nashville, TN, from

10-14 June 1991, a Birds Of a Feather (BOF) session on the Electronic

Frontier Foundation (EFF) will be held.  The EFF BOF will be held from

7-9pm on Tuesday, 11 June 1991.  Note the time change!  It will be

located in the Jefferson A room (the same room as the GNU BOF).  The

EFF BOF will now be held *before* (instead of after) the GNU BOF.


We will give an update of recent EFF activities, an overview of cases

the EFF has been involved with and their outcomes, the EFF's missions,

current and future projects, etc.  John Gilmore, a member of the EFF's

Board of Directors, will co-chair the BOF and will talk about some of

the work EFF has been doing on privacy technology, also known as

encryption, and the threats and promise we see in it.  There will be a

general question and answer session at the end of the BOF.


            -==--==--==-<>-==--==--==-


FEEDBACK


[Here are a few of the comments received on Effector Online 1.05:]


From tachyon@ucscb.UCSC.EDU Sun May 26 07:59:28 1991


Just two quick, unpolished comments, so I'm mailing them rather than

posting them.


I'm surprised at the amount of ridicule Jim Warren aimed at people

who might not want their names on CPSR (or other) mailing lists, when

it would be a simple enough matter for CPSR to include something like

"We periodically send out announcements and other mailings to people

on our mailing list.  Check here if you would prefer NOT to receive

these unsolicited mailings."


Mitch Kapor is being a little too quick in telling a Prodigy person

that the Well's conflict resolution methods do not involve

throwing people off the system, because I know that at least one

person HAS been thrown off the Well.  However, as a sysop myself,

I know that these systems can be sitting ducks for people who, for

whatever reason, have decided to spend as much time as possible

insulting and harassing other users.  I have thrown one user off

my own BBS for that reason.


----------


Subject: Cryptography, Mythology, and S. 266


In an article in Effector Online, Denise Caruso joins the crowd of people

all over the networks attacking a provision placed by Senator Biden into two

Senate bills (S. 266 and S. 618), which make it the "sense of the Senate" that

providers of encryption technology and communication services ensure that they

can provide, in response to proper court order, a clear-text version of any

material transmitted using their systems.


Caruso, and many others, have argued that such a law would require the use of

a "trap door", or in generally weakened cryptographic algorithms.  THIS IS

COMPLETELY FALSE.  What it mainly requires is record keeping.


The technical details get very complex, but in fact choosing a good crypto-

graphic algorithm is only the beginning of designing a usable cryptosystem.

Key distribution is as big a headache.  In most proposed systems, one uses a

unique "session key" for each communication session.  This key is provided to

the two participants by a central server.  A server that recorded the keys it

assigned would have no problem with the provisions of these bills.  Compromise

of the server is deadly to the entire system, whether it keeps records or not,

so this need imply no significant weakening of the system.  It certainly does

not require the insertion of any trap door or other weakness into the under-

lying cryptographic algorithms.


The public-key-based systems that Caruso refers to, as far as I know, do NOT

use public key cryptography to encrypt most user data.  Rather, they use it

to make the communication with the session-key server simpler.  Today, and

for at least the near-term future, known public-key algorithms are too ex-

pensive and slow to use for bulk data.  They can, however, be used in such

combined public/private key systems to get good performance with most of the

advantages of private key systems.


Why should anyone care about this technical detail?  (By now I'm sure I've

lost the real flamers, who know nothing but how to repeat catch phrases like

"trap door".)  Because basing an attack on S. 266 and such measures on some-

thing that is verifiably false is a good way to lose arguments.  Badly.


Suppose someone introduced a bill requiring the registration of all computer

equipment.  Would you argue against it on the grounds that only MS/DOS systems

could meet the registration requirement?


The problems with S. 266 and similar measures are NOT technical.  If you want

to object to them, do so on the basis of rights to privacy, protection of free

speech, or whatever.  Don't let the argument get onto the ground of what is

technically feasible, or you'll lose.

                                   -- Jerry

From: Jerry Leichter <leichter@LRW.COM>

            -==--==--==-<>-==--==--==-


ENDNOTES


    Effector Online would like to thank Damon A. Koronakos and Brian Roberts

at stanford.edu for the Hi-Tech Haikus that grace this issue.


    We also would like to extend our thanks to Leila Gallagher, a great 

volunteer and true pioneer of the Electronic Frontier. Without her constant

and generous efforts here at the office, the EFF would have floundered during

our first year.


    We are always interested in news, pointers, tall tales, quotes

jokes and brilliant strokes related to life on the Electronic

Frontier.

    Write to us with comments and criticism, or write for us if you

prefer.  Any letters or stories can be posted to comp.org.eff.talk,

or sent directly to the editor of Effector Online: van@eff.org.

    We'll be back in a fortnight with another edition.


         In the meantime, you are still on the Electronic Frontier.

                           Be careful out there.

                        -==--==--==-<>-==--==--==-


Comments

Popular posts from this blog

BOTTOM LIVE script

Evidence supporting quantum information processing in animals

ARMIES OF CHAOS