Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

malware in tor

Name: Anonymous 2013-08-04 19:30

Name: Anonymous 2013-08-05 22:12

>>119
Around 750k (1-2 houses)
We can kickstarter/fundables/massdrop it. Many have been successful:
http://www.kickstarter.com/projects/adapteva/parallella-a-supercomputer-for-everyone
http://www.open-pandora.org/
http://www.kickstarter.com/projects/ouya/ouya-a-new-kind-of-video-game-console

Opencores just hasn't made a demo/debut. Once they do, they will have all the donation money to buy their own


ALL OF THESE USE 512MB RAM, WHAT THE ACTUAL FUCK:
beaversource.oregonstate.edu/projects/cspfl
alwaysinnovating.com/products/keyboard.htm
isee.biz/products/processor-boards/igepv2-board
freescale.com/webapp/sps/site/application.jsp?code=APLSMABT


So we want ARM. Now which Peripherals?
I/O 3.5 mm phone connector ports
Ethernet, at the least 110Mb/s
2x USB ports
DisplayPort (if you something more feasible, please say so)
SDHC port
Anything else?

Name: Anonymous 2013-08-05 22:16

>>120
transistor
Do not trust the electric Jew. If it can't be done with vacuum tubes, it shouldn't be done at all.

Name: Anonymous 2013-08-05 22:32

Do not molest the larval Jew.
Do not talk about the the larval Jew.
Do not masturbate to images of the larval Jew.

Write your nation's legislature and express support for the use of capital punishment on illegal child pornographers.

If you know someone who has a child, call the police on them.

If you see someone wearing a EFF or ACLU emblem, refuse to help them.

Together, we can smite the kikes and children.

Name: >>121 2013-08-05 22:34

Uuu, why have I not seen this too:
http://en.wikipedia.org/wiki/HDBaseT
https://www.youtube.com/results?search_query=HDBaseT

It had all my ideas about using 8P8C as the universal peripheral. Beats the shit out of USB. I am only worried about the power consumption, and how hard it would be adapt it to other ports.

Name: Anonymous 2013-08-05 22:42

>>64
If the browser was running in a virtual machine, and the virtual machine could only access the internet through the host machine's tor, then the browser wouldn't be able to find out the real machines ip address. No process on the virtual machine could do that, not even root.

>>65-
prison rape is a serious and ignored issue. it isn't funny :(

Name: >>121 2013-08-05 22:44

Left out the important documentation: http://www.hdbaset.org/whitepapers

Name: Anonymous 2013-08-05 22:55

Tor Project's response: Stop using Windows and disable Javascript.

I can't say that's bad advice.

Name: Anonymous 2013-08-05 22:57

>>125
The easiest method is just to tell the JS client to get a file or make an identifying query to a server, and you are done.

Name: Anonymous 2013-08-05 22:59

>implying I have javascript enabled

Name: Anonymous 2013-08-05 23:03

>>122
I agree. Notice how all internet surveillance and government hacking bullshit is targeted for integrated circuits? The electric Jews have backdoors into everything that uses it. I've never trusted this transistor crap which apparently uses quantum effects (read - Jew magic) for something.

Name: Anonymous 2013-08-05 23:07

>>128
But the query would go through the tor network and the server wouldn't find anything out about the identity of the victim.

Name: Anonymous 2013-08-05 23:22

>>125
prison rape is a serious and ignored issue. it isn't funny :(
Your future cellmates disagree :)

Name: Anonymous 2013-08-05 23:33

If dubs then >>1-132 is going to prison and will be raped by aryans and niggers in the showers for months before ultimately being acquitted.

Name: Anonymous 2013-08-05 23:47

>>133
the ones that don't commit suicide, that is.

Name: Anonymous 2013-08-06 0:55

>>121
Some random ideas:
- Consider using NiMH cells instead of lithium (or supporting both). The tech has really advanced over the years and they are now very reliable and (more importantly) cheap.
- What keyboard switches? Some people might want Cherry MX Blue and some will want black or green or red. Should there be several variants? How will this affect pricing?
- Clit mouse. I don't know if the IBM patents have expired, but they are pretty useful and unintrusive.
- Shower a kernel and a debian dev with money until they force support for the system into mainline.

Netbook style is fine, but the option of having the LCD on the TOP or at a side without the lid monitor.
Medically speaking that's a bad idea (for the same reason smartphone users get chronic neck pain). Try looking down at your keyboard as you type for a long time and you'll see what I mean. What about instead making the LCD detachable?

Another idea for the LCD panel is to make the screen relatively small (<= 10inch), but position it high and add some stabilizer diagonal bars. That way if you're in a moving vehicle with a certain amount of vibration, the screen won't act as a resonator and (as a bonus over the usual swivel design) won't start slipping forward or backwards. See the diagram attached below for more information. The diagonal rod can be permanently jointed (with a 2d swivel) to the LCD panel.

data:application/x-xz;base64,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

Name: Anonymous 2013-08-06 0:57

>>132-134
you are all horrible

Name: re-DUN-dancy 2013-08-06 1:36

>>131
Sigh, Example 93:

Act I: The malware had been planted


JS file says to client:
"Give me all the info and settings I can get from my client/browser, make a user and session ID as a handle, with a time stamp I believe is true, and start making a timer. I shall call myself:
User-IDx:Checksum-hashX:Time-X:Duration-X:Session-ID

If I find cookies and other shit in the cache that I can get my hands on, compress them if I can, and make the metadata message. If can't read anything, prepare a message with my
User-IDx:Checksum-hashX:nothing-read. Message-x:Metadata-x:Metadata-HashX
complete, time to talk to a API on a DoD server."

JS client:
"Sending compressed what I could, and made packets sizable to send anywhere. If I can do multicast or anycast, awesome. Let me break my packets with my handle ID and my handle for the metadata and pass it around."

ProdServer1:
"Thank you for the packet exploit JS, User-IDx. It took you this amount of time(Duration-Y) to contact us since we sent this, and you say your timestamp is UTC-X, when our time is UTC-Y (Time-Y).
Here is our Session-IDxyhash and your new Temporary User-IDXYhash. Lets do some test with each other about our times to see if we have a reliable communication."

JS client: "Ok. I got all you messages, and your hashes matched. What would you lime me to do?"

ProdServer1:
"Please go to the Prodservers G, H, and J at your convenience (care not to overload your client and randomly stop at intervals) and tell them the same thing you told me, and your Temporary User-IDXY and Session-IDxyhash, and wait further instructions from the first one that tells you:
Communication-session_prod1_list_of_GUID_xy:Metadata-prod1_list_of_GUID_xy:Hash_message-

_prod1_list_of_GUID_xy:Time-UTC_master_prod1_list_of_GUID_xy_as_hash:Duration-GUID_xy
"


Act II: The NSA exploit network


ProdServer1 to MasterServers:
"I told User-IDx:Checksum-hashX:Time-X:Duration-X:Session-ID
to call servers G, H, and J with Temporary User-IDXY and Session-IDxyhash and
Communication-session_prod1_list_of_GUID_xy:Metadata-prod1_list_of_GUID_xy:Hash_message-prod1_list_of_GUID_xy:Time-UTC_master_prod1_list_of_GUID_xy_as_hash:Duration-GUID_xy.

Our session should be called
case-GUID_xy:session-GUID_xy:Mesh-xy:Time-GUID_xy:Duration-GUID_xy.Awaiting orders."

MasterServer U:
"I have that one already. Make it
GUID_xy2:session-GUID_xy2:Mesh-xy2:Time-GUID_xy2:Duration-GUID_xy2

And wait further instructions on."

ProdServer1:
"Copy that."

Anycast receiver server D to Server network:
"User-IDx:checksum-hashX:Time-X:Duration-X
shouted and said: 'Message-x:Metadata-x:Metadata-HashX'. No further actions done, would you like me to do some?"

ProdServer1:
"I got him as well. No need to do any further at the moment I told MasterServer U and gave me
GUID_xy2:session-GUID_xy2:Mesh-xy2:Time-GUID_xy2:Duration-GUID_xy2

He will contact servers G, H, and J, and we will inform you if we need you. Here is our session ID and checksum."

MasterServerU:
"Anycast receiver server D, no need to do anything further. The case is:
GUID_xy2:session-GUID_xy2:Mesh-xy2:Time-GUID_xy2:Duration-GUID_xy2

ProdServer1 got him perfectly. Did he talk to you?"

Anycast receiver server D:
"Yes, and here is our conversation: session-ID:checksum. Here is our session-ID:checksum"

MasterServerU:
"ProdServer1, Anycast receiver server D got your message an told me. Is that coorect?"

ProdServer1:
"Correct. Any new orders?"

MasterServerU:
"Thank you. I will pass this allong the network"

*MasterServerU responds to network, server G says its busy, and H do not respond. *
*MasterServerU informs everyone else about Servers G and H failings, and tells sys admins*


Act III: The communication


JS Client:
"Still looking at what I have, and compressing what I can with my limited knowledge. In case we find a duplicate like me, let me call myself
User-IDx2:Checksum-hashX2:Time-X:Duration-X2:Session-ID2

and append that I met Session-IDxyhash and was given Temporary User-IDXYhash just in case I fail talking to Servers G, H, and J. How here is server G"

Server G:
"Thank you for your message. But we are busy. Go to the Next server on your list"

JS client: "Ok, appending my new message to server H that Server G was busy and told me to go on my list."

* Server H never responces *

JS client: "Server H took too long to responded. Ok, appending my new message to server H took too long to responce. Going to server J."

Server J: "Oh thank you. I was waiting for you. That information you are giving me checks out. Your new handle is this:
GUID_xy2:session-GUID_xy2:Mesh-xy2:Time-GUID_xy2:Duration-GUID_xy2.

There are issue with Server G and H at the moment. Here is our session ID. Now go to reliable servers R, T, F, M, K, I, S, and § (which are geo-location timed, well informed of this case, and have access to your assumed Local ISP) and update them with you new case number and our summarized messages."

* JS client goes along and talks to various distributed networks and identify the local ISP that JS client has been talking wo the servers with the presumed times*
* The Prod and Analysis server update the information to the Master Serves, which in turn compare the case to others with all the new information gathered and stored in B trees. If they find a match from a previous client/ISP user, then wind down and inform the JSclient. If not, the a DoD agent office needs to investigate the area and tap the local network from the ISP. The dumb user is raided when enough evidence is acquired to convict with something, even lame copyright infringement *

Act Epilogue:
 
* Everyone lives happily ever after *
* The DoD got commition for another arrest in his quota. *
* The Stupid user gets affordable hospitality for years to come, and re educated that he is chattel. Hopefully gets to become the prison bitch, and gain fame and acceptance. *
* The artist that provided the data get no recompense, and probable jail time too. Sucks to be the providers, if you do not work for the Multinational banks. *
* Multinational banks win, win, WIN! *

Name: Anonymous 2013-08-06 1:59

>>137
I'm not sure if that would work. At least it wouldn't work well if the used on servers with public ip addresses. The average time samples would be determined by the location of the current end node, whose ip and geolocation is already known. And ISPs can't look for the pattern of traffic coming from your machine since it's encrypted. If tor could be broken this way I would be worried about standard use, since all it presumes is anticipating the user's traffic in advance and control of the contacted server. But if the phone home servers are hidden services, maybe you can extract information based upon timing there. I don't know how hidden services are done.

Name: >>138 2013-08-06 2:12

But in any case, this sounds like more than our friends at the FBI are capable of. I'm sure the NSA could pull it off, but I doubt they would waste their time on 40 year olds jacking off to kids.

Name: Anonymous 2013-08-06 2:15

>>139
They waste their time on drug dealers. Why not pedophiles? It's just as likely that they don't though, because if they did, and they admitted it, support for their spying programs would be at 99%.

Name: Anonymous 2013-08-06 2:22

>>140
Good point. All they would have had to do is pull out a 6 foot long folded paper of pictures of pedophiles naked in front of their hacked webcams that were caught, and say, ``Thanks to this program, we have captured these dangerous pedophiles and they are now being raped in prison as we speak.'' Instant applause.

Name: Anonymous 2013-08-06 3:31

>>135
- NiMH cells indeed. UPS unit better.
- People vote, use the #1 for the kit.If all else, opt out from the #1. Like we did for the ErgoDox. Likely Cherry MX Blue will win again. f-ing noise makers
- Mmm, I like stylus resistive touch monitors better. But hey, I'll let it slide if people want them that badly. It is still patented:
It was only three years later, working at IBM, that Selker refined his design, resulting in the TrackPoint product[4] for which IBM received US patents in 1996.[5][6]
^ US 5521596, Edwin J. Selker & Joseph D. Rutledge, "Analog input device located in the primary typing area of a keyboard", issued 1996-05-28
^ US 5489900, Matthew F. Cali; Jerome J. Cuomo & Donald J. Mikalsen et al., "Force sensitive transducer for use in a computer keyboard", issued 1996-02-06
http://worldwide.espacenet.com/publicationDetails/biblio?CC=US&NR=5521596&KC=&FT=E&locale=en_EP
http://worldwide.espacenet.com/publicationDetails/biblio?CC=US&NR=5489900&KC=&FT=E&locale=en_EP


- Shower a kernel and a debian dev
done:
https://www.yoctoproject.org/download/yocto-project-13-poky-80
http://www.angstrom-distribution.org/
http://www.debian.org/CD/jigdo-cd/#which

I guess you are right about the monitor. I just always use my eays to look down, like reading a book, having on my waist, without my hands holding in the air... But a detachable Monitor would be awesome. Full z and x 180°
Another idea for the LCD panel is to make the screen relatively small (<= 10inch), but position it high and add some stabilizer diagonal bars. That way if you're in a moving vehicle with a certain amount of vibration, the screen won't act as a resonator and (as a bonus over the usual swivel design) won't start slipping forward or backwards. See the diagram attached below for more information. The diagonal rod can be permanently jointed (with a 2d swivel) to the LCD panel.
Like in http://alwaysinnovating.com/products/smartbook.htm ?

Does the file have the leading '/'?: /Td6WFoAAATm1rRGAgAhARYAAAB0L
And tell me the Content-Type: than a .xz compressed file. .jpeg, .gif, .pdf, .svg, etc.. Not trying to patronize, but here is is a great cheat sheet:
http://www.iana.org/assignments/media-types
https://en.wikipedia.org/wiki/MIME

>>138
palmface.gif
Somehow you missed the public relevations that in the USA all ISP Backbones are required to have gateways/backdoors to monitor traffic, with cryptography breaker. Some, A&TT, Verizon, and Co., are even making a profit of this, making their interfaces even easier for any DoD agent (e.g. a lowly police officer) to use and openly gather the data. It has actually never been easier to social engineer your way to steal data from end users. The internet was always the high seas with piracy a mock; now its just a clusterfuck of boonies.

My example assumes you cannot get the IP address from the normal ProdServer1 tests, which works 98% of the time. If that fails, you using geolocation techniques until you get to ISP's community server. You are only one copyright away from being arrested these days. Even then, they do it anyway without any probable cause, just cause they can. It truly has become the boonies.

Also, are you really using Dialup/PPP or [a]DSL?
Do-Do-Double facepalm. It was super effective.

Name: NSA your time has come 2013-08-06 4:24

they can break an atheist but they cannot break a theist

Name: Anonymous 2013-08-06 5:11

>>143
Take it easy tdavis. Everything is going to be ok.

Name: Anonymous 2013-08-06 5:12

>>133

Lol, I actually think it is funny if pedofiles go to prison and get raped. I really gonna enjoy your stories. Thank you, Tor, this is supa duppa of you ^_^

Name: Anonymous 2013-08-06 5:12

>>143
tdavis, are you a pedophile?

Name: Anonymous 2013-08-06 5:16

I sometimes play this game, it is called deflect the predator to the nsa. Then I make a special link with a picture, which sends an email to the nsa info address with your ip and the text: I am searching cp ;)

Hahaha, I think that is hilarious

Name: Anonymous 2013-08-06 5:20

>>147
That's real fucking neat-o.

Name: Anonymous 2013-08-06 5:22

I also do that with badly designed scam sites, where the original exploit is still in use. Just change the send script to send an email to the fbi instead of only dumping the private information to the disk.

Name: Anonymous 2013-08-06 8:05

>>142
NiMH cells indeed. UPS unit better.
I mean just an AA battery compartment (hot-swappable would be great, though it may introduce some extra complexity). I'm not sure if they make control circuits for NiMH though (so that the batteries inside recharge when you plug in the computer). Even without a recharging control circuit, it's still not that bad since quality NiMH rechargers are a dime a dozen nowadays (unlike Li-Ion chargers which are expensive as fuck) and because NiMH isn't that sensitive to being in a discharged state (unlike Li-Ion which may entirely stop working).

Mmm, I like stylus resistive touch monitors better. But hey, I'll let it slide if people want them that badly.
That would be far more expensive than a clit mouse well, depending on how much IBM charges for that patent.

Shower a kernel and a debian dev / done
There will still very likely be chipset (if it's particularly new) or board specific code. The ultimate goal is to have stock debian (testing) to be able to boot it with full functionality. None of that cloning five git trees (including a full kernel fork) and building kernel and uboot and patched version of libxyz and then realize some idiot broke the kernel last night and flame them on IRC (as fun as that may be).

Like in http://alwaysinnovating.com/products/smartbook.htm ?
Not exactly, look at the updated drawing at [ http://i.imgur.com/2ktSfmb.png ]. The green, pink and blue lines are literally just steel rods, there are no large implicit surfaces in the diagrams (the only surfaces are that of the keyboard and of the LCD screen). The blue rods surrounding the keyboard are attached to it though it's not shown in the drawing (for clarity). The pink double-ended arrow indicates which way the attachment between the pink (LCD panel support rod) and blue (keyboard) rods can be adjusted in order to make the screen go forwards or backwards. Also note that this implies that the attachment between the green (LCD panel) and blue (keyboard) rods must be a hinge whose axis is the blue rod. I actually have an idea on how to accomplish exactly that in a sturdy and stable manner. Also note that none of the hinges/swivels require friction (which means the friction components won't gradually fade over time (like old laptops whose screens won't hold still anymore) since there aren't any).

The main disadvantage with this design is that it takes about 15 seconds to separate the keyboard and LCD panel (e.g. when you're getting off a bus, for example), unlike a laptop where you just have to close the lid (which takes about 2 seconds). Considering the gain (you don't get neck pain for looking down at the screen), it's probably worth it.

Another concern is that the LCD panel connectors must be extremely durable (i.e. support daily insertion/removal for years). The LCD cable should also easily detach from the LCD panel if forced without breaking anything (in case someone accidentally pulls on it). This might be very difficult since LVDS requires a fuckload of lines and has some EM shielding constraints if I remember correctly; a LVDS serializer/deserializer pair might be needed to reduce the number of lines.

Name: 150 2013-08-06 8:15

Also you should look for an LCD screen that is at least partially reflective (my thinkpad screen is entirely visible in direct sunlight and it's just a regular LCD). Not Pixel Qi since those are fucking expensive.

Finally the overall price shouldn't be over 400 USD, and preferably under 300 USD.

Name: Anonymous 2013-08-06 8:18

you might be able to lower the price drastically by using the FSF as free advertising and thus getting a lot of gnutards to buy it.

Name: >>150 2013-08-06 8:29

Also, since there is no hard drive, there should be at least two SD card slots and default boot should be off SD. Internal NAND is a waste of money.

Name: !Ip2edo5TLk 2013-08-06 8:42

I can confirm I was banned by the jews for 3 days, just like nikita. Using proxy to evade the ban. Fucking kikes.

Name: Anonymous 2013-08-06 8:44

>>154
Enjoy your prison rape, !Ip2edo.

Name: !Ip2edo5TLk 2013-08-06 8:46

>>155
not gonna happen! enjoying my freedom.

Name: Anonymous 2013-08-06 9:19

>>156
Not for long! Better start stretching your anus so it doesn't hurt as much.

Name: Anonymous 2013-08-06 15:02

This story is hilarious. People on /. and reddit are going apeshit although all that happened is that the FBI managed to get the IPs of all the retards who had been using Tor on Windows with javascript enabled.

Name: Anonymous 2013-08-06 15:08

le reddit

Name: Anonymous 2013-08-06 16:12

I mean just an AA battery compartment (hot-swappable would be great, though it may introduce some extra complexity). I'm not sure if they make control circuits for NiMH though.
A23 Cells or PP3 batteries (5-6V device, unless you want 4-5 AA or AAA cells). And yeah,there are lots of controller these days now. You can even remove the UPS unit from motherboards these days, extremely carefully.

We can make the stylus optional. It is only a simple plastic matrix with a 4 pin cable, usually embedded to USB, and as cheap as 10 USD. And since it detachable, you can place it anywhere. Of course I'll place a frame on it, to handle it, and prevent leaving debris:
http://www.ebay.com/sch/i.html?_nkw=resistive+touch+screen
http://www.ebay.com/itm/5-Inch-4-Wire-Resistive-Touch-Screen-Digitizer-Car-Touch-Screen-Free-Shipping-/200949783050?pt=LH_DefaultDomain_0&hash=item2ec98a5a0a
http://www.ebay.com/itm/5-Inch-4-Wire-Resistive-Touch-Screen-Digitizer-Car-Touch-Screen-Free-Shipping-/200949783050?pt=LH_DefaultDomain_0&hash=item2ec98a5a0a
http://www.ebay.com/itm/4-8-Inch-4-Wire-Resistive-Touch-Screen-Digitizer-Free-Shipping-/190880687270?pt=LH_DefaultDomain_0&hash=item2c716024a6


But if you are going to ask for the pointing stick patent, send an anonymous email with the From address as chanprog@mailinator.com so that we can all see it at:
http://www.mailinator.com/inbox.jsp?to=chanprog
The current respondent is: patswip@us.ibm.com
And the place to make an inquiry if they do is:
https://www-01.ibm.com/contact/submissions/extsub.nsf/index

Shower a kernel and a debian dev / done
I get your point. We do that AFTER we have the board designed. I know the LoongSon laptop was a huge success:
http://www.gnewsense.org/Projects/Lemote

Not exactly, look at the updated drawing at [ http://i.imgur.com/2ktSfmb.png ].
Ah thanks. I get it. So it was
Content-Type: image/png ; application/xz <CR>
Content-Transfer-Encoding: base64 <CR>

<LF> is implied, since I did <LF> them.
Also use postimage.org for longer images duration (since you can delete them at any time), or tiikoni.com/tis/ for temporary image; he even has polls: tiikoni.com/poll/

Another concern is that the LCD panel connectors must be extremely durable (i.e. support daily insertion/removal for years). The LCD cable should also easily detach from the LCD panel if forced without breaking anything (in case someone accidentally pulls on it).
That might be the most expensive part: a triple layer cable, with the last one being the actual tension resistor, and the actual cable and EM insulator underneath, being a tad longer than the resistive/reinforcing cable. The end ports on both sides will be a variant mini-DIN connector that is easily detachable, but it has an iris diaphragm latch on both sides (LCD and keyboard hub). The iris diaphragm is controlled by a small rotating hex graved hedge knob, with either of these drives: Mortorq, Robertson, TTAP, Bristol, Clutch, Torq-set (2nd fav), TA (fav), Tri-wing (3rd fav. SHARINGAN!); making it compatible for human finger adjustments, and wrench and screw driver compatible (for the ones with bad fingers). Unless you want to use a rotational level, so fingers and pliers are ever used. I wonder if we should make all the screws similar heads... nah too costly.
Also you should look for an LCD screen that is at least partially reflective
Umm, just coat the LCD with any reflective plastic or tape. <5 USD. Heck, we can even use Acrylic glass (PMMA). Unless you want the LCD with a LED on the back as well (like everyone is doing). Swapable Coat? Unless there something else I am not understanding:
https://en.wikipedia.org/wiki/Transflective_liquid_crystal_display#Trade_names

Finally the overall price shouldn't be over 400 USD, and preferably under 300 USD.
In a great group buy, that is possible. Unless you want to ask for funding out in the market.

Also, since there is no hard drive, there should be at least two SD card slots and default boot should be off SD. Internal NAND is a waste of money.
At the least a 1 GB hard drive for swap and temporary files, that has a special command to wipe itself. ExpressCard or CompactFlash? Unless you want to run everything on RAM. We do not want to expire SD cards which have the OS and the data. Waiting on Microsft to end their exFAT patent. Actually reviewing the wiki on Secure digital, it has DRM in place:
http://en.wikipedia.org/wiki/Secure_Digital#DRM_copy-protection
Why not make the slots then MMC?:
http://en.wikipedia.org/wiki/MultiMediaCard

More notes:
https://en.wikipedia.org/wiki/Mini-DIN_connector
https://en.wikipedia.org/wiki/Memory_cards

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List