From: owner-ammf-digest@smoe.org (alt.music.moxy-fruvous digest) To: ammf-digest@smoe.org Subject: alt.music.moxy-fruvous digest V14 #3739 Reply-To: ammf@fruvous.com Sender: owner-ammf-digest@smoe.org Errors-To: owner-ammf-digest@smoe.org Precedence: bulk alt.music.moxy-fruvous digest Friday, March 13 2020 Volume 14 : Number 3739 Today's Subjects: ----------------- Why The Ancient Chinese Never Got Diabetes ["Blood Sugar" Subject: Why The Ancient Chinese Never Got Diabetes Why The Ancient Chinese Never Got Diabetes http://diahead.bid/c3EJduUFe5ovXGf_2nZtV9SW7OywyRedakQzYHw1ncWjsE0A http://diahead.bid/fBTTDsbsObdIVcK2ek-x3t7dCk8SsATD-xDof43PURNsOjGX n Greek historiography, Herodotus (484b425 BC) had written brief descriptions of ancient Ethiopians, who were also mentioned in the New Testament. Although the Byzantine Empire maintained regular relations with Ethiopia during the Early Middle Ages, the Early Muslim conquests of the 7th century severed the connection between Ethiopia and the rest of Christendom. Records of these contacts encouraged medieval Europeans to discover if Ethiopia was still Christian or had converted to Islam, an idea bolstered by the presence of Ethiopian pilgrims in the Holy Land and Jerusalem during the Crusades. During the High Middle Ages, the Mongol conquests of Genghis Khan (r. 1206b1227) led Europeans to speculate about the existence of a priestly, legendary warrior king named Prester John, who was thought to inhabit distant lands in Asia associated with Nestorian Christians and might help to defeat rival Islamic powers. The travel literature of Marco Polo and Odoric of Pordenone regarding their separate journeys to Yuan-dynasty China during the 13th and 14th centuries, respectively, and fruitless searches in southern India, helped to dispel the notion that Prester John's kingdom existed in Asia. A lost treatise by cartographer Giovanni da Carignano (1250b1329), which only survives in a much later work by Giacomo Filippo Foresti (1434b1520), was long presumed to attest to a diplomatic mission sent by Ethiopian emperor Wedem Arad (r. 1299b1314) to Latin Europe in 1306; recent research indicates that this mission was unconnected to Solomonic Ethiopia, however. In his 1324 Book of Marvels the Dominican missionary Jordanus, bishop of the Roman Catholic Diocese of Quilon along the Malabar Coast of India, was the first known author to suggest that Ethiopia was the location of Prester John's kingdom. The Florentine merchant Antonio Bartoli visited Ethiopia from the 1390s until about 1402 when he returned to Europe with Ethiopian diplomats. This was followed by the lengthy stay of Pietro Rombuldo in Ethiopia from 1404 to 1444 and Ethiopian diplomats attending the ecumenical Council of Florence in 1441, where they expressed some vexation with the European attendees who insisted on addressing their emperor as Prester John. Thanks to the legacy of European medieval historiography, this belief persisted beyond the Late Middle Ages. For instance, the Portuguese missionary Francisco Clvares set out for Ethiopia in 1520 believing that he was to visit the homeland of Pre ------------------------------ Date: Thu, 12 Mar 2020 07:56:17 -0400 From: "Hearing Aids" Subject: The iHear PRO hearing aid is the perfect match for people with hearing problems The iHear PRO hearing aid is the perfect match for people with hearing problems http://beslimihear.icu/PIMe4iIRnUPUhwB5eMwHTQeQGhAnPcMWjviIJswCEsCD0fCc http://beslimihear.icu/orUH7dzRVcK6zBzvcSz6GAxzaZ75zP4xhH-tTHVWxTlAe3ih The development of UMTS introduced an optional Universal Subscriber Identity Module (USIM), that uses a longer authentication key to give greater security, as well as mutually authenticating the network and the user, whereas GSM only authenticates the user to the network (and not vice versa). The security model therefore offers confidentiality and authentication, but limited authorization capabilities, and no non-repudiation. GSM uses several cryptographic algorithms for security. The A5/1, A5/2, and A5/3 stream ciphers are used for ensuring over-the-air voice privacy. A5/1 was developed first and is a stronger algorithm used within Europe and the United States; A5/2 is weaker and used in other countries. Serious weaknesses have been found in both algorithms: it is possible to break A5/2 in real-time with a ciphertext-only attack, and in January 2007, The Hacker's Choice started the A5/1 cracking project with plans to use FPGAs that allow A5/1 to be broken with a rainbow table attack. The system supports multiple algorithms so operators may replace that cipher with a stronger one. Since 2000 different efforts have been made in order to crack the A5 encryption algorithms. Both A5/1 and A5/2 algorithms have been broken, and their cryptanalysis has been revealed in the literature. As an example, Karsten Nohl developed a number of rainbow tables (static values which reduce the time needed to carry out an attack) and have found new sources for known plaintext attacks. He said that it is possible to build "a full GSM interceptor...from open-source components" but that they had not done so because of legal concerns. Nohl claimed that he was able to intercept voice and text conversations by impersonating another user to listen to voicemail, make calls, or send text messages using a seven-year-old Motorola cellphone and decryption software available for free online. GSM uses General Packet Radio Service (GPRS) for data transmissions like browsing the web. The most commonly deployed GPRS ciphers were publicly broken in 2011. The researchers revealed flaws in the commonly used GEA/1 and GEA/2 ciphers and published the open-source "gprsdecode" software for sniffing GPRS networks. They also noted that some carriers do not encrypt the data (i.e., using GEA/0) in order to detect the use of traffic or protocols they do not like (e.g., Skype), leaving customers unprotected. GEA/3 seems to remain relatively hard to break and is said to be in use on some more modern networks. If used with USIM to prevent connections to fake base stations and downgrade attacks, users will be protected in the medium term, though migration to 128-bit GEA/4 is still recommended ------------------------------ Date: Thu, 12 Mar 2020 19:45:10 -0500 From: "New Warranty" Subject: Email Exclusive: Discounted rate on Auto Warranty Hi ammf-digest@smoe.org!! It only takes 5 minutes to start saving money on your Auto insurance!! Stop overpaying on Auto Insurance! 5 minutes could save you hundreds! Best Auto Insurance provides helpful guides and resources, free! Compare Auto Insurance Rates Free! Can't Load Image? CLICK HERE To See it! If you do not wish to continue receiving email newsletters CLICK HERE or send post-mail To 382 Cedar Ave. New York, NY 10382 ------------------------------ End of alt.music.moxy-fruvous digest V14 #3739 **********************************************