| ==Phrack Magazine== |
|
|
| Volume Five, Issue Forty-Five, File 14 of 28 |
|
|
| **************************************************************************** |
|
|
| Updated Last : 3.14.1994 |
| Late Night Hack Announcement #4.2 |
|
|
| XXXXXXXXXXXXXXXXXXXXXXXX XX DEF CON II Convention Update Announcement |
| XXXXXXXxxxxXXXXXXXXXXXXXXX XX DEF CON II Convention Update Announcement |
| XXXXXXxxxxxxXXXXXX X X DEF CON II Convention Update Announcement |
| XXXXXxxxxxxxxXXXXXXX X DEF CON II Convention Update Announcement |
| XXXXxxxxxxxxxxXXXX XXXXXXXXX DEF CON II Convention Update Announcement |
| XXXxxxxxxxxxxxxXXXXXXXXXX X DEF CON II Convention Update Announcement |
| XXxxxxxxxxxxxxxxXXXXXX XX X DEF CON II Convention Update Announcement |
| XXXxxxxxxxxxxxxXXXXXXXX DEF CON II Convention Update Announcement |
| XXXXxxxxxxxxxxXXXXXXXX X XX DEF CON II Convention Update Announcement |
| XXXXXxxxxxxxxXXXXXXXXXX XX X DEF CON II Convention Update Announcement |
| XXXXXXxxxxxxXXXXXXXXX X DEF CON II Convention Update Announcement |
| XXXXXXXxxxxXXXXXXXXXXXXXXX DEF CON II Convention Update Announcement |
| XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX DEF CON II Convention Update Announcement |
|
|
| READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE |
|
|
| ============================================================================= |
|
|
| What's this? This is an updated announcement and invitation to DEF CON II, |
| a convention for the "underground" elements of the computer culture. We try |
| to target the (Fill in your favorite word here): Hackers, Phreaks, Hammies, |
| Virii Coders, Programmers, Crackers, Cyberpunk Wannabees, Civil Liberties |
| Groups, CypherPunks, Futurists, Artists, Etc.. |
|
|
| WHO: You know who you are, you shady characters. |
| WHAT: A convention for you to meet, party, and listen to some speeches |
| that you would normally never hear. |
| WHEN: July 22, 23, 24 - 1994 (Speaking on the 23rd and 24th) |
| WHERE: Las Vegas, Nevada @ The Sahara Hotel |
|
|
| So you heard about DEF CON I, and want to hit part II? You heard about the |
| parties, the info discussed, the bizarre atmosphere of Las Vegas and want to |
| check it out in person? Load up your laptop muffy, we're heading to Vegas! |
|
|
| Here is what Three out of Three people said about last years convention: |
|
|
| "DEF CON I, last week in Las Vegas, was both the strangest and the best |
| computer event I have attended in years." -- Robert X. Cringely, Info World |
|
|
| "Toto, I don't think we're at COMDEX anymore." -- CodeRipper, Gray Areas |
|
|
| "Soon we were at the hotel going through the spoils: fax sheets, catalogs, |
| bits of torn paper, a few McDonald's Dino-Meals and lots of coffee grounds. |
| The documents disappeared in seconds." -- Gillian Newson, New Media Magazine |
|
|
| DESCRIPTION: |
|
|
| Last year we held DEF CON I, which went over great, and this year we are |
| planning on being bigger and better. We have expanded the number of |
| speakers to included midnight tech talks and additional speaking on Sunday. |
| We attempt to bring the underground into contact with "legitimate" speakers. |
| Sure it's great to meet and party with fellow hackers, but besides that we |
| try to provide information and speakers in a forum that can't be found at |
| other conferences. |
|
|
| While there is an initial concern that this is just another excuse for the |
| evil hackers to party and wreak havoc, it's just not the case. People come |
| to DEF CON for information and for making contacts. We strive to distinguish |
| this convention from others in that respect. |
|
|
| WHAT'S NEW THIS YEAR: |
|
|
| This year will be much larger and more organized (hopefully) than last year. |
| We have a much larger meeting area, and have better name recognition. |
| Because of this we will have more speakers on broader topics. Expect |
| speaking to run Saturday and Sunday, ending around 5 p.m. Some of the new |
| things expected include: |
|
|
| > An Internet connection with sixteen ports will be there, _BUT_ will only |
| provide serial connections because terminals are too hard to ship. So |
| bring a laptop with communications software if you want to connect to the |
| network. Thanks to cyberlink communications for the connection. |
|
|
| > There will be door prizes, and someone has already donated a Cell Phone |
| and a few "Forbidden Subjects" cd ROMs to give away, thanks to Dead Addict. |
|
|
| > Dr. Ludwig will present his virus creation awards on Sunday. |
|
|
| > A bigger and better "Spot The Fed" contest, which means more shirts to |
| give away. |
|
|
| > More room, we should have tables set up for information distribution. |
| If you have anything you want distributed, feel free to leave it on the |
| designated tables. Yes, this year there will be a true 24 hour |
| convention space. |
|
|
| > A 24 hour movie / video suite where we will be playing all type of stuff. |
| VHS Format. Mail me with suggested titles to show, or bring your own. |
| We'll use a wall projector when not in use by speakers. |
|
|
| > Midnight Tech Talks on Friday and Saturday night to cover the more |
| technical topics and leave the days free for more general discussions. |
|
|
| WHO IS SPEAKING:============================================================= |
|
|
| This list represents almost all of the speakers verified to date. Some |
| people do not want to be announced until the event for various reasons, or |
| are waiting for approval from employers. A speaking schedule will go out |
| in the next announcement. |
|
|
|
|
| Philip Zimmerman, Notorious Cryptographer & Author of PGP. |
|
|
| Dr. Ludwig, Author of "The Little Black Book of Computer Viruses," and |
| "Computer Viruses, Artificial Life and Evolution" |
|
|
| Loyd Blankenship (The Mentor), Net Running in the 90's and RPG. |
|
|
| Padgett Peterson, Computer Enthusiast, Anti-Virus Programmer. |
|
|
| The Jackal, A Radio Communications Overview, Digital Radio and the Hack Angle. |
|
|
| Judi Clark, Computer Professionals for Social Responsibility. |
|
|
| Gail Thackery, (Of Operation Sun Devil Fame), Topic to be Announced. |
|
|
| To be Announced, The Software Publishers Association, Topic to be Announced. |
|
|
| Toni Aimes, Ex U.S. West Cellular Fraud, Cellular Fraud Topics. |
|
|
| Mark Lotter, Cellular Enthusiast, Hacking Cell Phones. |
|
|
| Lorax, The Lighter Side of VMBs. |
|
|
| Peter Shipley, Unix Stud, Q&A on Unix Security. |
|
|
| George Smith, Crypt Newsletter, Virus Topic to be Announced. |
|
|
| Cathy Compton, Attorney, Q&A Surrounding Seizure Issues, Etc. |
|
|
| John Littman, Reporter and Author, Kevin Poulson, Mitnick, and Agent Steal. |
|
|
| Red Five & Hellbender, Madmen With a Camcorder, Who Knows? |
|
|
| Erik Bloodaxe, Phrack Editor, Wierd Wireless Psycho Shit.. Stay Tuned.. |
|
|
| There should be a few round table discussions on Virus, Cellular, Unix and |
| something else surrounding the industry. |
|
|
| I'll name the rest of the speakers as they confirm. I'm still working on |
| a few (Two?) people and groups, so hopefully things will work out and I can |
| pass the good news on in the next announcement, or over our List Server. |
|
|
| ============================================================================ |
|
|
| WHERE THIS THING IS: |
|
|
| It's in Las Vegas, the town that never sleeps. Really. There are no clocks |
| anywhere in an attempt to lull you into believing the day never ends. Talk |
| about virtual reality, this place fits the bill with no clunky hardware. If |
| you have a buzz you may never know the difference. It will be at the Sahara |
| Hotel. Intel is as follows: |
|
|
| The Sahara Hotel: 1.800.634.6078 |
|
|
| Room Rates: Single/Double $55, Triple $65, Suite $120 |
| (Usually $200) + 8% tax |
|
|
| Transportation: Shuttles from the airport for cheap. |
|
|
| NOTE: Please make it clear you are registering for the DEF CON II |
| convention to get the room rates. Our convention space price is |
| based on how many people register. Register under a false name if |
| it makes you feel better, 'cuz the more that register the better for |
| my pocket book. No one under 21 can rent a room by themselves, so |
| get your buddy who is 21 to rent for you and crash out. Try to contact |
| people on the Interactive Mailing List (More on that below) and |
| hook up with people. Don't let the hotel people get their hands on |
| your baggage, or there is a mandatory $3 group baggage fee. Vegas |
| has killer unions. |
|
|
| OTHER STUFF: |
|
|
| I'll whip up a list of stuff that's cool to check out in town there so if for |
| some reason you leave the awesome conference you can take in some unreal |
| sites in the city of true capitalism. If anyone lives in Las Vegas, I |
| would appreciate it if you could send a list of some cool places to check out |
| or where to go to see the best shows and I'll post it in the next |
| announcement or in the program |
|
|
| -> I am asking for people to submit to me any artwork, pictures, drawings, |
| logos, etc. that they want me to try and include in this years program. |
| I am trying to not violate any copyright laws, but want cool shit. Send |
| me your art or whatever and I'll try and use it in the program, giving you |
| credit for the work, of course. Please send it in .TIF format if it has |
| more than eight bit color. The program will be eight bit black and white, |
| -> in case you want to make adjustments on your side. |
|
|
|
|
| PLEASE DONATE "STUFF" FOR THE GIVEAWAY: |
|
|
| We are trying to raffle off interesting and old functional items. If |
| you have anything such as old computers, modems, weird radio stuff, books, |
| magazines, etc that you want to get rid of, please call or mail me with |
| what it is, or bring it along. I don't want to waste peoples time giving |
| away rubber bands or anything, but pretty much anything else will go. |
|
|
| *** NEW MAILING LIST SERVER *** |
|
|
| We've finally gotten Major Domo List Serv software working (Kinda) and it |
| is now ready for testing. MTV spent a lot of time hacking this thing to work |
| with BSDi, and I would like to thank him. The purpose of the list is to |
| allow people interested in DEF CON II to chat with one another. It would |
| be very useful for people over 21 who want to rent hotel space, but split |
| costs with others. Just mention you have room for 'x' number of people, and |
| I'm sure you'll get a response from someone wanting to split costs. Someone |
| also suggested that people could organize a massive car caravan from Southern |
| Ca. to the Con. My attitude is that the list is what you make of it. Here |
| are the specifics: |
|
|
| Umm.. I TAKE THAT BACK!! The mailing list is _NOT_ ready yet. Due to |
| technical problems, etc. I'll do another mass mailing to everyone letting |
| them know that the list is up and how to access it. Sorry for the delay! |
|
|
|
|
| MEDIA: |
|
|
| Some of the places you can look for information from last year include: |
|
|
| New Media Magazine, September 1993 |
| InfoWorld, 7-12-1993 and also 7-19-1993 by Robert X. Cringely |
| Gray Areas Magazine, Vol 2, #3 (Fall 1993) |
| Unix World, ???, |
| Phrack #44, #45 |
|
|
| COST: |
|
|
| Cost is whatever you pay for a hotel room split however many ways, plus |
| $15 if you preregister, or $30 at the door. This gets you a nifty 24 bit |
| color name tag (We're gonna make it niftier this year) and your foot in the |
| door. There are fast food places all over, and there is alcohol all over |
| the place but the trick is to get it during a happy hour for maximum |
| cheapness. |
|
|
| ============================================================================ |
|
|
| I wanted to thank whoever sent in the anonymous fax to Wired that |
| was printed in issue 1.5 Cool deal! |
|
|
| ============================================================================= |
|
|
| FOR MORE INFORMATION: |
|
|
| For InterNet users, there is a DEF CON anonymous ftp site at cyberspace.com |
| in /pub/defcon. There are digitized pictures, digitized speeches and text |
| files with the latest up to date info available. |
|
|
| For email users, you can email dtangent@defcon.org for more information. |
|
|
| For non-net people call: |
|
|
| ---- A L L I A N C E ---- |
| SysOp Metalhead |
| One Thousand One Hundred Megabytes Online |
| 612.251.8596 USRobotics 16.8 Dual Standard |
| Synchronet Multinode BBS Software |
| International Informational Retrieval Guild (IIRG) Distro Site |
| Electronic Frontier Foundation (EFF) MEMBER |
| American Bulletin Board Association (ABBA) MEMBER |
| ----------------------------------------------------------------------- |
| o 200+ Message bases. No post call ratio. Nope, not ever. |
| o FidoNet [1:282/8004] |
| o CyberCrime international [69:4612/2] |
| o International Networked message ECHO areas: |
| UFO, VIRUS, REPTILE, MUSIC, Twin Cities Chat, NORML, Telephone Watch, |
| TRADEWARS, MONTE PYTHON, FCC, NO PIRACY, CLASSIFIEDS |
| BBS Software & SYSOP Support, MUSIC, FISHING/HUNTING, Stephen King, |
| Programming, Computers, Foreign Language, iCE/ACiD/TRiBE, COLLEGE |
| LIVING, POLITICS, POETRY, RACISM, and too many more to mention |
| o Computer Underground Magazines, History, Updates & Text |
| o DEF CON Mirrior Archive |
| o uXu, PHANTASY, CuD, EFF Magazine(s) Distro Site |
| o Internet email mailbox (your.name.here@f8004.n282.z1.fidonet.org) |
| o 30 day FULL ACCESS Trial Account...$10/year MEMBERship (sub. to change) |
| ----------------------------------------------------------------------- |
|
|
| For Snail Mail send to: DEF CON, 2709 E. Madison Street Suite #102, |
| Seattle, WA, 98112 |
|
|
| For Voice Mail and maybe a human (me), 0-700-TANGENT on an AT&T phone. |
|
|
| A DEF CON Mailing list is maintained, and the latest announcements are mailed |
| automatically to you. If you wish to be added to the list just send email |
| to dtangent@defcon.org. |
|
|
| ============================================================================= |
|
|
| (Note, I have put a copy of Dr. Ludwig's new KOH Data security encryption |
| Virus online at the DEF CON ftp site in /pub/defcon/KOH along with full |
| documentation. Get CrAzY.) |
|
|
|
|
| VIRUS CREATION AWARDS: |
|
|
| Announcing |
| The |
| Second International Virus Writing Contest |
| Sponsored by |
| American Eagle Publications, Inc. P.O. Box 41401 |
| Tucson, AZ 85717 USA |
| and |
| The Crypt Infosystems BBS |
| +1 (818) 683-0854 |
|
|
| *** The Goal *** |
|
|
| The purpose of this contest is to write a fully functional computer virus that |
| entertains people with political satire. Viruses will be judged on the basis |
| of originality, creativity, functionality, and political incorrectness. |
|
|
| *** Eligibility *** |
|
|
| Anyone who can write a computer virus is eligible. |
|
|
| *** Contest Dates *** |
|
|
| The contest is underway from January 1, 1994 until June 30, 1994. Your |
| submissions must be received by June 30 to qualify. The winner of the |
| contest will be announced at the DEFCON conference in Las Vegas, July 22-24, |
| 1994. If you can be present, an official award will be bestowed on you at |
| that time. |
|
|
| ************************************************************* |
|
|
| Details |
|
|
| ************************************************************* |
|
|
| The philosopher Friedrik Nietzsche once said that if you want to kill |
| something, you must laugh at it--and laugh at it deeply. So there should be |
| little wonder that political satire is as old as politics itself. |
|
|
| Is there something going on in the political arena that you abhor, that makes |
| you sick, that is just plain wrong? Well, here's your chance to make a |
| mockery of it. I've always had this idea that if someone wrote a sufficiently |
| witty virus that really addressed the issues the way the people (not the |
| press, not the politicians) saw them, it might just get passed around by |
| people voluntarily. |
|
|
| Let's find out. |
|
|
| Write a virus that is itself a political satire. I don't mean a virus that |
| simply displays a message. I mean a living entity whose every move--whose |
| every action--is politically motivated. If you need more than one virus to |
| make your point--perhaps two viruses working together, or something like that, |
| that is fine. |
|
|
| ----------------------------------------------------------- |
| Let me give you a simple example: The Political Correctness Virus |
|
|
| This virus is a spoof on the "political correctness" movement--which is just |
| a form of self-imposed censorship--that is sweeping American intellectual |
| circles, particularly colleges and universities. |
|
|
| This virus is a memory resident boot sector virus which maintains a list of |
| politically incorrect words on your computer system. It also hooks the |
| keyboard interrupt and monitors every keystroke you make. If you type a |
| politically incorrect word into the computer, the PCV springs into action. |
|
|
| Politically incorrect words are ranked at three different offense levels. |
| When the PCV encounters such a word, it determines what offense level that |
| word is, and acts accordingly. |
|
|
| The least offensive words merely register a beep. More offensive words cause |
| a beep to sound for 10 seconds. The most offensive words cause a siren to |
| sound for two minutes, locking the system for that duration. If you turn the |
| computer off before the two minutes are up, the virus will stop the boot |
| process for five minutes, with sirens, when you turn it back on. If you allow |
| the siren to complete, then you can proceed. |
|
|
| The virus has two different word lists, both stored in an encrypted and |
| compressed format. The list is selected at random when the system is |
| infected, after which it cannot be changed. The first list is the "proper" |
| list of political correctness no-no's. For example, a word like "sodomite" is |
| among the worst possible offenses. The second list is an inverted list of |
| no-no's. This list trys to force you to use "sodomite" by flagging words |
| like "gay" and "homosexual" as no-no's. |
|
|
| If you allow the PCV to live in your system for three months without getting |
| a single flag, you are given the supreme honor of viewing the word list |
| assigned to you and adding a word to it. If you get more than 3000 flags in |
| a lifetime, the virus will force you to enter a politically correct word |
| before allowing you to start the computer, since you are obviously unwilling |
| to submit to its censorship. |
|
|
| The virus also uses powerful means to prevent disinfection, so that, once you |
| get it, you can't get rid of it without a major effort. |
|
|
| ------------------------------------------------------------ |
|
|
| Now, I know you can get a lot more creative than this--so do it! Design your |
| virus carefully, so that everything it does has meaning. Then send it in. |
|
|
| Here are the criteria we'll use: |
|
|
| 1. Originality: Your virus must be an original work. Do not send us anything |
| that is not 100% yours. Your message should be original too. Do not just |
| ape what everybody else is saying, especially the media. Also, a refined wit |
| is much to be preferred over vulgarity. Vulgarity is a substitute for |
| original wit. Foul language, porn, etc., are out. Destructive features should |
| be incorporated only if they are VERY appropriate (perhaps if you are |
| commenting on real live genocide in your country, or something like that). |
| In general, though, destructive features will hurt you, not help you. The one |
| exception is modifying anti-virus programs. That is considered to be |
| CONstructive activity. |
|
|
| 2. Creativity: Make us laugh, make us cry. Amaze us with how bits and bytes |
| can say something about politics and issues. Think of it like this: |
| displaying a message on the screen is like reading a text file. What we want |
| is the equivalent of a multi-media extravaganza. Use all the system's |
| resources to tell your message. Don't be afraid to write a virus that has |
| some weird mode of infecting programs that tells a story, or to write one |
| that sends faxes to the White House, or sends an automatic request for reams |
| of free information to some government agency. |
|
|
| 3. Functionality: The virus has to work. If it only works on some machines, |
| or under some versions of DOS, or what-not, then that will count against |
| you. The better it is at infecting systems and moving around, the better off |
| you will be. So, for example, if you write a file-infector, make sure it can |
| jump directories, and--if you're up to it--migrate across a network. |
|
|
| 4. Political incorrectness: Since computer viruses are politically incorrect, |
| their message should be too. If you send us a pro-establishment virus, then |
| you will not win this contest. A word to the wise: think twice about what's |
| correct and what's not. Many positions are only superficially incorrect, |
| though they are really quite fashionable among the establishment. Look at it |
| this way: if you could get a well-written letter expressing your view |
| published in a big city newspaper, then it's not sufficiently incorrect. |
| There are a LOT of ideas that are unofficially censored by society-- |
| especially the media and academia. They tend to make themselves out to be the |
| rebels, but they are really the establishment. If you can't think of anything |
| creatively incorrect and sufficiently obnoxious then you shouldn't be writing |
| viruses in the first place. |
|
|
| ************************************************************* |
|
|
| How to Submit an Entry |
|
|
| You may mail your entry to American Eagle Publications at the above address, |
| or you may e-mail it to ameagle@mcimail.com. Alternatively, you can submit it |
| by dialing the Crypt Infosystems BBS and uploading it there. To get on to the |
| system quickly, efficiently and anonymously, log on as VIRUS, using the |
| password CONTEST. |
|
|
| An entry consists of: |
|
|
| 1. A complete copy of your virus, both source and executable files. |
|
|
| 2. If the political satire isn't perfectly obvious, send a verbal description |
| of how the virus works and why it does what it does. This is especially |
| important if you are not an American and you are commenting on something that |
| has not received worldwide attention. I don't care if you're Bulgarian and |
| you're commenting on something we've never heard of--just make sure you |
| explain it, or we won't understand and you'll lose. |
|
|
| 3. If you want to be recognized for your work, include your name (real or |
| handle), and a way we can get in contact with you. |
|
|
| By submitting an entry, you grant American Eagle Publications, Inc. the right |
| to publish your virus in any form. You agree not to make your virus public |
| prior to July 25, 1994. If you do, you are automatically disqualified from |
| the contest. |
|
|
| For the sake of privacy, you may encrypt your entry and send it in with the |
| following PGP key (which we highly recommend if you have PGP): |
|
|
| -----BEGIN PGP PUBLIC KEY BLOCK----- |
| Version: 2.1 |
|
|
| mQCNAi09jVgAAAEEAN3M9LFQXeBprkZuKo5NtuMC+82qNd3/8saHLO6iuGe/eUai |
| 8Vx7yqqpyLjZDGbAS7bvobrcY3IyFeu8PXG4T8sd+g81P0AY0PHUqxxPG3COvBfP |
| oRd+79wB66YCTjKSwd3KVaC7WG/CyXDIX5W6KwCaGL/SFXqRChWdf2BGDUCRAAUR |
| tApDT05URVNUXzk0 |
| =Z20c |
| -----END PGP PUBLIC KEY BLOCK----- |
|
|
| Good luck! |
|
|
| **************************************************************** |
|
|
| P R I Z E S |
|
|
| In addition to instant worldwide fame and recognition, you'll get: |
|
|
| 1. A cash prize of $100 US. |
|
|
| 2. A year's subscription to Computer Virus Developments Quarterly. |
|
|
| 3. Your virus will be published in Computer Virus Developments Quarterly, |
| and other fine journals. |
|
|
| 4. A handsome engraved plaque recognizing your contribution to the betterment |
| of mankind. |
|
|
| 5. A free secret surprise that we cannot tell you about right now, valued |
| at $100. |
|
|
| Two runner-ups will receive the secret surprise. |
|
|
| !! GO FOR IT !! |
|
|
|
|
| ============================================================================= |
|
|
| STUFF TO SPEND YOUR MONEY ON: |
|
|
| > Tapes of last years speakers (four 90 minute tapes) are available for $20 |
|
|
| > DEF CON I tee-shirts (white, large only) with large color logo on the |
| front, and on the back the Fourth Amendment, past and present. This is |
| shirt v 1.1 with no type-o's. These are $20, and sweatshirts are $25. |
|
|
| > DEF CON II tee-shirts will be made in various colors this year, including |
| a few long sleeve shirts. Sizes will be in XL only again, with few white |
| larges made. Shirts will be $15, Long Sleeve $17, Sweat shirts will be $20. |
| Well, actually, I'll make a small quantity of various stuff, so with luck |
| you'll find something you like. |
|
|
| > We will have a few (ten maybe?) embroidered hats with this years logo. |
| Not sure how much they will be.. like $10 maybe. |
|
|
| > Full sized 4 color DEF CON II wall posters will be for sale for about $5. |
|
|
| > Pre-Register for next year in advance for $15 and save half. |
|
|
| > Make all checks/money orders/etc. out to DEF CON, and mail to the address |
| above. Way above. Above the virus awards announcement. |
|
|
| If you have any confidential info to send, use this PGP key to encrypt: |
|
|
| -----BEGIN PGP PUBLIC KEY BLOCK----- |
| Version: 2.3 |
|
|
| mQCrAiyI6OcAAAEE8Mh1YApQOOfCZ8YGQ9BxrRNMbK8rP8xpFCm4W7S6Nqu4Uhpo |
| dLfIfb/kEWDyLreM6ers4eEP6odZALTRvFdsoBGeAx0LUrbFhImxqtRsejMufWNf |
| uZ9PtGD1yEtxwqh4CxxC8glNA9AFXBpjgAZ7eFvtOREYjYO6TH9sOdZSa8ahW7YQ |
| hXatVxhlQqve99fY2J83D5z35rGddDV5azd9AAUTtCZUaGUgRGFyayBUYW5nZW50 |
| IDxkdGFuZ2VudEBkZWZjb24ub3JnPg== |
| =ko7s |
| -----END PGP PUBLIC KEY BLOCK----- |
|
|
| - The Dark Tangent |
|
|