From: Glen Todd Area: Public Key Encryption To: Joe Eversole 17 Feb 95 14:23:40 Subject: Golded @enc: PGP UpdReq -----BEGIN PGP SIGNED MESSAGE----- Despite the advice of tribal elders, Joe said Golded @enc: PGP to Scott SM> Does anyone have any further info on this kludge? Is this just to make it SM> easier for sysops to bounce PGPed traffic or is there another use for it? JE> Well, that feature seems to work. =) What feature?{puzzled look} // Glen PGP F2F935C1 -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: The right of the people to be secure in their persons and papers iQCUAwUBL0TsFx1IzyRmn+dFAQEJTQP4t4KY7JRxryjqSrug5wGOgP3Kspf8FBMK E0Vg+ndD+8T0GtoTAP5fFnE32zVc+oYpERdK7KK1A6KfffWPyLwFik59WdXcuzox qRUiq7DzPY55Q/VdM2EfNqZkHcKnQQOhDa/XhhMxYc5EYnsWki13s/o2cjLOnhay gvLM+QN8Lg== =ukjE -----END PGP SIGNATURE----- ... Redundancy: An airbag in Rush Limbaugh's car. 201434369420143436942014343694201434369420143436942014343694718 From: Donald Price Area: Public Key Encryption To: Zorch Frezburg 16 Feb 95 21:17:00 Subject: Howdy UpdReq -----BEGIN PGP SIGNED MESSAGE----- Just thought I'd drop a line to ya and see what's been up. I'm just testing this PGP interface type program. Works nice. See Ya! Donald -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBL0QxJ7N6p1QTDElVAQHyXwP/UVdD6BVwR05KzZQV84waJEIyJjVU2iPb hCNvDtUI+fkXWLx1zG9aQF1GXceyVgFA0FfBWwfM0ZPPGr5f9+zxy4a7uuB8gdIs PXriiJR78+znzmO8GgBBaw/I1o5d+r8qLGMXW6iMBourYLqvL3YqRi1lc5TCIRzH cbPJ+LZEEnU= =eIve -----END PGP SIGNATURE----- ~~~ PGPBLUE v1.7 ... MONEY TALKS ... but all mine ever says is GOODBYE! ___ Blue Wave/QWK v2.12 201434369420143436942014343694201434369420143436942014343694718 From: Scott Mills Area: Public Key Encryption To: Alan Pugh 16 Feb 95 08:25:10 Subject: Can I Freq Pgp? UpdReq -----BEGIN PGP SIGNED MESSAGE----- Sunday February 12 1995, Alan Pugh writes to Scott Mills: AP> wow. the mod should be informed of some of the various other methods AP> of stenography where messages can be hidded in a message of any kind. Ivan didn't want to be informed of anything. He was quite content in his ignorance. I tried explaining the differences between encrypted messages, clearsigned messages, and the PGP fingerprint he was upset about. His argument boiled down to "If I say the string PGP fingerprint = CD 45 F4 ... is encryption then it's encryption". Not even discussion of PGP is welcome over there. Scott Bill Clinton doesn't lie...he's ethically challenged! Scott Mills 1024/26CD5D03 For my PGP key freq PGPKEY sm@f119.n265.z1.fidonet.org -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBL0NTpyP6qSQmzV0DAQH82wQAhNfCFH1iMj5ewfgw/gtTqPafjy4GhWfT yyhj21grX0hDkTzaj8rIcpDXesp/1pQkNswax5wYClD6jbDEY9bALg1TWTWi6fTt KPVUiZKFsNqehYRCXBY/XcQJ7fmOmrT7E+8dYgv06U7SQRYE2eWkJEz2+q0cNO7W H03ebC0RaLg= =Yrur -----END PGP SIGNATURE----- --- 201434369420143436942014343694201434369420143436942014343694718 From: Scott Mills Area: Public Key Encryption To: Glen Todd 16 Feb 95 08:42:32 Subject: Can I Freq Pgp? Pvt UpdReq -----BEGIN PGP SIGNED MESSAGE----- Tuesday February 14 1995, Glen Todd writes to Scott Mills: SM>> just upgraded to the new alpha release and notice I now get a kludge SM>> line on every PGPed message of "ENC: PGP". Your mess's don't have that SM>> line. Are GT> No, I'm running 2.50b1016. Haven't upgraded because I've heard (on GT> GOLDED) that Beta4 has it's share of problems, That it did. A bug fix went out right behind it that fixed the more glaring problems. I don't know if the ENC: kludge appeared before or after the bug fix. GT> I posted a message in GOLDED enquiring about this. We'll see if GT> anybody deigns to answer it. I lurk over there. I'll keep an eye out for any messages on the kludge. Scott Holodeck computer...end Clinton administration program. Scott Mills 1024/26CD5D03 For my PGP key freq PGPKEY sm@f119.n265.z1.fidonet.org -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBL0NXYiP6qSQmzV0DAQGuMQP/VqBZgJV5gr9Suwtz2KDIRH++6i/gNBLB wWP/RiV4GXWKqZ+pWLJijFNYTq72uCMqpxb5HlIl30f/WMcy4pzUN9LmBsh3boAT 0aVwKZ6TmuWMUljZ6KIZyoXu9T1Y5lZ5i0kLyvAkR7aEkaPTXIZuh+5/bD3PvARy 0jYtanDl0kc= =/UH3 -----END PGP SIGNATURE----- --- 201434369420143436942014343694201434369420143436942014343694718 From: Scott Mills Area: Public Key Encryption To: David Chessler 16 Feb 95 08:48:26 Subject: Quotes as passphrase UpdReq -----BEGIN PGP SIGNED MESSAGE----- Monday February 13 1995, David Chessler writes to Shawn Mcmahon: >> to Gutmann, "probably involves concentrated acid, belt sanders, etc." SM>> Others tell me that the government doesn't even TRY to erase hard drives >> with sensitive information. They stick 'em in a warehouse, under armed >> guard. I suspect Gutmann is closer to the truth. I remember long ago seeing a stack of old hard-drives being thrown out by the U.S. Marshall Service. All with big "DECLASSIFIED" stickers on them. What I was told when I asked was that they were bulk erased before leaving the office. Of course this was in the early 80's. DC> Yes, that is what happens. Some years ago a file cabinet full of secret DC> documents from the state department showed up at Lorton Prison for DC> refinishing. The prisoners tried to sell the documents, and State found DC> out only when the reporters to whom the prisoners were trying to sell them DC> called security. That's easy to believe at Lorton. Did you see the flap in Virginias General Assembly? It seems the office mail system delivered some mail addressed to a democratic rep to a republican with a similar name. Seems the mail contained some documents that were embarassing to the democrats so "some one in the office" leaked them to the press. I love it when the governments trips on its self. DC> When I give up a machine at work, I leave stuff the client or employer is DC> entitled to have. The rest, I run a secure erase program, and then DC> overwrite with innocuous files, which I then erase (but which could be I thought the most efficient way to erase a drive was to type "recover"? Scott New Opcode #4: HCF - Halt and Catch Fire Scott Mills 1024/26CD5D03 For my PGP key freq PGPKEY sm@f119.n265.z1.fidonet.org -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBL0NaOSP6qSQmzV0DAQEB1AQAkngMB140X+YoFpQkB1RogWieaNv9k89R Ososq0TdGzx3B5KdOff3WbBVqAq0wZk1l1sToGmbGuKQ3AoY+i5N+J1aX8km4ika cjP3uWzRpkKkC/YY4Xf0j9xZI0VkT5otYS2NuCBbVFTvInA6FHuT9X4KcxhyvJ3h F1oehjLVa3E= =45fC -----END PGP SIGNATURE----- --- 201434369420143436942014343694201434369420143436942014343694718 From: Scott Mills Area: Public Key Encryption To: Armando Ortiz 16 Feb 95 23:49:02 Subject: PGP for OS/2 Slow v3.0 UpdReq -----BEGIN PGP SIGNED MESSAGE----- Wednesday February 08 1995, Armando Ortiz writes to ALL: AO> Is there a version of PGP for OS/2 or is it going to run under the OS/2 AO> DOS Window? There sure is. You can freq it here as PGPOS2 or download it as PGP262O2.ZIP. AO> POW 1.2 0052 After waiting 3 days for OS/2 Warp to load, I've AO> come AO> to the conclusion that it sucks. You might want to jump over to one of the OS/2 conferences and see if someone can help you speed it up. I'm running it on a 386/40 with 8 meg and have no problems at all. It is slow to boot but since I only reboot every month or so that's no problem. Scott 4 out of 5 doctors agree - Hillary's hazardous to health. Scott Mills 1024/26CD5D03 For my PGP key freq PGPKEY sm@f119.n265.z1.fidonet.org -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBL0QrzCP6qSQmzV0DAQEIDAQAg+z6I+q+2VEetpBj+OmqEc9W9LZh/UZu NKtWIZk4Zt9yqbzDImCKXFwPO+VRORpLqQ8x55ckkDD3/HAmQI16Wj40TVyxvoYU RhCyAtiXIV9kJrJwQ0RdKMwvZ34eH1ph+VG8ERl9gGpsojOHPE+wiqQUtH8lTi21 gQgi1/j/6zo= =efm0 -----END PGP SIGNATURE----- --- 201434369420143436942014343694201434369420143436942014343694718 From: Scott Mills Area: Public Key Encryption To: Armando Ortiz 16 Feb 95 23:55:28 Subject: Unauthorized Entry UpdReq -----BEGIN PGP SIGNED MESSAGE----- Saturday February 11 1995, Armando Ortiz writes to Nolan Lee: AO> If you've beta tested software, then you had to go through a AO> questionnaire direct from the developer answering each individual AO> question that you come across...I doubt you've beta tested anything AO> except an IUD... Well, I've beta tested OS/2 2.1, and both Warp betas. No questionares required. For 2.1 all it took was a call to an 800 number and a mailing address to get two copies mailed off. Run your beta test how you want but requiring that kind of info wont get you an honest cross-section of potential users. Considering the large negative reaction you got on this echo I'd say the testers you get will not be those most likely to use your final product. Scott He is dead, he is damned, he is WEDDED!! Scott Mills 1024/26CD5D03 For my PGP key freq PGPKEY sm@f119.n265.z1.fidonet.org -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBL0QtriP6qSQmzV0DAQGC9gQAmhQuPsMUD+a9HBvg/viqE/S+/RgKuAla NGEhlisOkEriFAQ4X0yOFlVUhghB/zEPl8Izlrm6bQq1GYOJOiUBjRDPv7hUDYGd mHUQpiLmsJeCgFspG19kIxl88wEtIfXxKeCpFOD3d38S3a35paXmSMDPh8JfifvN i9ec5l4C6BQ= =Si+R -----END PGP SIGNATURE----- --- 201434369420143436942014343694201434369420143436942014343694718 From: Scott Mills Area: Public Key Encryption To: Armando Ortiz 17 Feb 95 00:03:06 Subject: unauthorized info gatheri UpdReq -----BEGIN PGP SIGNED MESSAGE----- Saturday February 11 1995, Armando Ortiz writes to Christopher Baker: AO> PGP is illegal outside of the United States. Beta testing UAE AO> outside AO> of the U.S. would not only make the project void, but would bring out AO> the government from under the rocks. Besides, it's much less costly to AO> send Snail Mail within the U.S. PGP is not unlawful outside the U.S. Federal regs prohibit exporting the software outside of the U.S. or Canada but that doesn't make the use of it unlawful in other countries. Contrary to what the feds seem to think some times U.S. law only applies in the states. And what does any of that have to do with using the continental U.S. only? Has ITAR now been interpreted to prohibit "export" to Hawaii and Alaska? If the USnail is to expensive then just use email. You obviously have access to it. You could make everyones life simpler. Scott Unspeakable error in module Cthulhu at address R'lyeh. Scott Mills 1024/26CD5D03 For my PGP key freq PGPKEY sm@f119.n265.z1.fidonet.org -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBL0QvjCP6qSQmzV0DAQHOqAQAsz29tZ1K74YZF2gxzv9BBO91rC/NfPo1 1xbRraBNlKz8aUlMO7kQdpU4lhYEHQ1kLwDzFD5j0vBU7zWpCFGiK76JdeeMUzhC bQf2FDIe0qDzocp0CMfi4iKhZz/r6SVi31DFb4QTAH1yDh3g58GXu8YSAcnTJ3Ur +1dhSAsKFq4= =s9pQ -----END PGP SIGNATURE----- --- 201434369420143436942014343694201434369420143436942014343694718 From: Chris Adams Area: Public Key Encryption To: Armando Ortiz 16 Feb 95 23:29:26 Subject: unauthorized info gatheri UpdReq On (11 Feb 95) Armando Ortiz wrote to Christopher Baker... ->what has that got to do with it? how will you verify it? AO> I consider 21 or over a mature adult. 18 is barely given time enough to AO> grow and people 21 or over, I'm assuming, have major position AO> occupations. I want to make sure that the candidates we're gathering AO> for beta testing have the knowledge to know how to grade software. This is a complete mistake. You should really check on individuals, as there are many under 18, like myself, who would do far better at grading software (and helping you track bugs) than your desired 21+ people. With computers, age has relatively little value. Of course, most people don't really seem to act mature until around 27 or so, so you might just want 30-40 year olds... ... I can resist anything except temptation. 201434369420143436942014343694201434369420143436942014343694718 From: NEIL ANSLEY Area: Public Key Encryption To: ALL 17 Feb 95 06:27:00 Subject: Encryption UpdReq Hello All! I am really new at this encryption stuff, and I was just wondering if anybody had a FAQ or something telling about IDEA and PGP and whatever, especially as regarding the mathematical basis of it, etc. Thank you. TTYL />eil ___ OLX 2.2/TLX 2.00 "Call it a hunch..." - Quasimodo. 201434369420143436942014343694201434369420143436942014343694718 From: Steve Linton Area: Public Key Encryption To: Bruce Davis 12 Feb 95 11:31:00 Subject: BLUEWAVE & PGPBLU HELP!!! UpdReq -----BEGIN PGP SIGNED MESSAGE----- Bruce Davis wrote to David Mcintyre on 02/10/95... BD> By the way, I HIGHLY recommend PGPBLUE as a BlueWave/PGP BD> Interface. I've been using it for approximately 6 months...and it's BD> a good solid program. Bruce, I hope that you can help me! I recently got a copy of PGPBLUE vs. 3.0 but I have not been able to get it to work with my other programs. I'm using PGP vs. 2.6.2 and BLUEWAVE vs. 2.12. I have followed the installation procedures to the letter, yet when I try to run it I get the following error message from PGP: "Error: 'pgpblue.tmp' is not a ciphertext, signature, or key file." Then my editor appears with the original encrypted text all quoted! If I tell Bluewave not to quote the message, then I get the same error message, and the editor appears with a blank screen! This all occured when trying to decrypt a message. I get a different error message from PGP when I try to clearsign a message: "File [pgptemp.txt] does not exist." I have tried everything that I can think of to solve this but to no avail! If you have any suggestions that may be of help I would be most grateful. Steve-- ... ... Key fingerprint = 4E 62 8C 51 9C 78 7B FF 31 26 89 4A 75 40 C8 00 ___ Blue Wave/QWK v2.12 -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBLz5k12k0W6whtWE5AQH8ZwQAgqRXyDRQ3zynZDn+i/K8jwBN1/7Y0bTd TB3+zwMiSKBLcTzM5SVGj5nv8sfid5449AiJ953m/k3Jjk2bhIxoX6I2QycWGj+f lfx06mChFozNkPTxtfJZ0Ju5oi39JReT4TivLBYc7EFcUfR2htxtQmd8oetIbzqY Jra8sEIf0II= =6iKF -----END PGP SIGNATURE----- 201434369420143436942014343694201434369420143436942014343694718 From: Mark Drew Area: Public Key Encryption To: Jim Gorges 15 Feb 95 19:23:00 Subject: RE: PGPBLUE UpdReq -=> Quoting Jim Gorges to Mark Drew <=- JG> I know OAK.OAKLAND.EDU had version 2.5 available Thanks, I'll look there. ... The facts, although interesting, are irrelevant. ___ Blue Wave/QWK v2.12 201434369420143436942014343694201434369420143436942014343694718 From: jason carr Area: Public Key Encryption To: all 18 Feb 95 10:13:24 Subject: Do you guys think this type of thing is constructive? Comments?UpdReq --> Note: Forwarded (from: netmail) by jason carr using timEd. Original was from jason carr to Patty Morris. --> Note: Reply to a message in MECCA. Patty Morris wrote in a message to Chris Shocklee: PM> Encrypted messages, PGP signatures, etc, should be not PM> used in this echo. If you feel the need for secrecy, use PM> direct netmail, or better yet, a telephone. :-) /* Nitpick mode ON */ Public key digital signatures (PGP signatures, in this case) are not used for secrecy. Quite the opposite, they are used to authenticate the message. I'm not trying to convince you to allow the sigs, but rather pointing out a possible [error? inconsistency? misunderstanding?] in the rules. /* Nitpick mode OFF */ :) jason ... I am Frau Blucher ... ___ timEd-B9 201434369420143436942014343694201434369420143436942014343694718 From: jason carr Area: Public Key Encryption To: Doug Muth 18 Feb 95 12:36:22 Subject: Re: Unauthorized Entry UpdReq -----BEGIN PGP SIGNED MESSAGE----- Doug Muth wrote in a message to Armando Ortiz: DM> And what do you intend to do about the fact that DM> Windoze uses a swap file and unencrypted stuff that is in DM> memory could get swapped to the HD? D'oh!!!!! jason ... Make that two hearing aids, straight up. -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: PGP_ECHO: CypherEcho to the gods... iQCVAwUBL0Zad0jhGzlN9lCZAQF+twP/SQVfF7v9Krpfo80G85fAUigaulMj8LfH WDSvegtLRSt4ScqmRUFPoY9SHoEpfTWcNxS5nzVxh3mB9j42nKDuW3lBz8I897Jm h/Vej9kvLlfFJaDSBD2pzsOW8qqtjU1GE95IC9VSklpFg/hlatF5ur73wmhD6WRu s5dVSLczoDU= =RJki -----END PGP SIGNATURE----- ... Key fingerprint = 60 97 B2 AE 7D 90 11 2F 05 1C 35 98 E9 B9 83 61 201434369420143436942014343694201434369420143436942014343694718 From: Christopher Baker Area: Public Key Encryption To: All 18 Feb 95 18:33:54 Subject: where are they? UpdReq -----BEGIN PGP SIGNED MESSAGE----- can someone post a msg from Armando Oritz showing his path line? i see many replies to his traffic since his first msg about the beta testing but not a single one of them came here in original form. thanks. TTFN. Chris -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: PGP 2.6.2 is LEGAL in Zone 1! So USE it! [grin] iQCVAwUBL0aD58sQPBL4miT5AQGgnAP/XvvyU1xo3ei0JUhbDKcaLldRUBgbNq/H 0xVcpSIeX8AEtjlHYokkr7lL4mu7GPYMp/S4LghrgUMevYG86McUtTTeF8FzYUdn 1phUDoYq6qJtdtjSwGgJpVouaONFIB6JjgKIDuV0mJLwARt119qSMLDE4wMfDft9 /AOwFNf5DNk= =QG3g -----END PGP SIGNATURE----- 201434369420143436942014343694201434369420143436942014343694718 From: Shawn McMahon Area: Public Key Encryption To: David Chessler 19 Feb 95 12:22:54 Subject: Pgp news UpdReq Despite the stern warnings of the tribal elders, David Chessler said this to Jim Bell: DC> What did they put Al Capone in prison for? Do you remember? Tax evasion, David. That's an actual crime. They had an actual charge. 201434369420143436942014343694201434369420143436942014343694718 From: Shawn McMahon Area: Public Key Encryption To: Chris Adams 19 Feb 95 12:24:30 Subject: Quotes as passphrase UpdReq Despite the stern warnings of the tribal elders, Chris Adams said this to David Chessler: CA> Probably. How would multitasking with something OS/2 affect it? It seems CA> that swapping a few different programs in and out would complicate their CA> job a bit keeping things straight. They don't read your RAM, just your screen. (And, maybe, your keyboard.) Multitasking wouldn't mean much. 201434369420143436942014343694201434369420143436942014343694718 From: Shawn McMahon Area: Public Key Encryption To: Donald Price 19 Feb 95 12:27:14 Subject: Howdy UpdReq Despite the stern warnings of the tribal elders, Donald Price said this to Zorch Frezburg: DP> Just thought I'd drop a line to ya and see what's been up. I'm DP> just testing this PGP interface type program. Works nice. It'll work better if you spell his name right, Don. :-) "Frezberg" 201434369420143436942014343694201434369420143436942014343694718 From: Scott Mills Area: Public Key Encryption To: Wes Perkhiser 17 Feb 95 23:06:50 Subject: Inquiry Pvt UpdReq Wednesday February 15 1995, Wes Perkhiser writes to Scott Mills: WP> For what it's worth (and by now way off topic?) there is a program (for WP> MS-Dos) that can look at a file (regardless of extension) and output an WP> error code based on the type of compression that file used. Do you mean UNP or some other utility? If it's a different one do you have a name and freq or ftp site? I wouldn't mind adding it to my utilities. Scott New Intel opcode #006 CHOKE: Compare hot opcode key ending Scott Mills 1024/26CD5D03 For my PGP key freq PGPKEY sm@f119.n265.z1.fidonet.org --- 201434369420143436942014343694201434369420143436942014343694718 From: Scott Mills Area: Public Key Encryption To: Joe Eversole 18 Feb 95 00:08:50 Subject: Golded @enc: PGP UpdReq -----BEGIN PGP SIGNED MESSAGE----- Sunday February 12 1995, Joe Eversole writes to Scott Mills: SM>> Does anyone have any further info on this kludge? Is this just to SM>> make it easier for sysops to bounce PGPed traffic or is there another SM>> use for it? JE> Well, that feature seems to work. =) A feature that was easily disabled in a few minutes with a hex editor. Scott Clinton _is_ helping the economy: Rope sales are up! Scott Mills 1024/26CD5D03 For my PGP key freq PGPKEY sm@f119.n265.z1.fidonet.org -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBL0WBMyP6qSQmzV0DAQHytQQAvhiIEgDJR4s0gOgaXIL6vuRWfopUMh5w GtiW25mgGw0an+TEh95f+X4AWKu3SJBxWsghr6cqlBEQA5T8PWn+xFy58Tc8LGsb dVGAhX2EsySaYu4VxKFsJh/AO0NpPBzwA6Orx1dgqK8OWXr9vObPw4medyM3VVgw aGj0hrRsGb8= =D4tO -----END PGP SIGNATURE----- --- 201434369420143436942014343694201434369420143436942014343694718 From: David Chessler Area: Public Key Encryption To: Shawn Mcmahon 17 Feb 95 20:11:00 Subject: Re: inquiry UpdReq On 02-14-95 (13:50), Shawn Mcmahon, in a message to Donald Rose about "RE: INQUIRY", stated the following: SM> DR> Better yet, take a .gif file and crypt it about 60 times SM>The extra encryption steps will just waste your time, not theirs. SM>There'll be one key that can completely decrypt the final product, >unless I have a fundamental misunderstanding of the principles involved. >It won't necessarily be the key you expect, but if they're brute-force >decrypting the thing they'll find that key, not your key. Whether or not this is true depends on the encryption method used. For example, if you used triple DES, the brute-force key would have 112 or more bits, rather than the 56 bits of the single DES key. Moreover, the encryption method itself is different and more complex. I'm not sure there is a single 112 bit key that can decrypt; rather they have to decrypt with one 56 bit key, then the second, and then again with the first. (As I recall triple DES, you encrypt with the first key, decrypt with the second [getting garbage], and then encrypt again with the first. Encryption and decryption are symetric, but steps are reversed, so you can "decrypt" plaintext to get cyphertext with DES.) -- ___ __ david.chessler@neteast.com d_)--/d chessler@capaccess.org chessler@trinitydc.edu * SLMR 2.1b * E-mail: ->132 1:109/459 david.chessler@neteast.com 201434369420143436942014343694201434369420143436942014343694718