| ==Phrack Magazine== | |
| Volume Five, Issue Forty-Five, File 14 of 28 | |
| **************************************************************************** | |
| Updated Last : 3.14.1994 | |
| Late Night Hack Announcement #4.2 | |
| XXXXXXXXXXXXXXXXXXXXXXXX XX DEF CON II Convention Update Announcement | |
| XXXXXXXxxxxXXXXXXXXXXXXXXX XX DEF CON II Convention Update Announcement | |
| XXXXXXxxxxxxXXXXXX X X DEF CON II Convention Update Announcement | |
| XXXXXxxxxxxxxXXXXXXX X DEF CON II Convention Update Announcement | |
| XXXXxxxxxxxxxxXXXX XXXXXXXXX DEF CON II Convention Update Announcement | |
| XXXxxxxxxxxxxxxXXXXXXXXXX X DEF CON II Convention Update Announcement | |
| XXxxxxxxxxxxxxxxXXXXXX XX X DEF CON II Convention Update Announcement | |
| XXXxxxxxxxxxxxxXXXXXXXX DEF CON II Convention Update Announcement | |
| XXXXxxxxxxxxxxXXXXXXXX X XX DEF CON II Convention Update Announcement | |
| XXXXXxxxxxxxxXXXXXXXXXX XX X DEF CON II Convention Update Announcement | |
| XXXXXXxxxxxxXXXXXXXXX X DEF CON II Convention Update Announcement | |
| XXXXXXXxxxxXXXXXXXXXXXXXXX DEF CON II Convention Update Announcement | |
| XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX DEF CON II Convention Update Announcement | |
| READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE | |
| ============================================================================= | |
| What's this? This is an updated announcement and invitation to DEF CON II, | |
| a convention for the "underground" elements of the computer culture. We try | |
| to target the (Fill in your favorite word here): Hackers, Phreaks, Hammies, | |
| Virii Coders, Programmers, Crackers, Cyberpunk Wannabees, Civil Liberties | |
| Groups, CypherPunks, Futurists, Artists, Etc.. | |
| WHO: You know who you are, you shady characters. | |
| WHAT: A convention for you to meet, party, and listen to some speeches | |
| that you would normally never hear. | |
| WHEN: July 22, 23, 24 - 1994 (Speaking on the 23rd and 24th) | |
| WHERE: Las Vegas, Nevada @ The Sahara Hotel | |
| So you heard about DEF CON I, and want to hit part II? You heard about the | |
| parties, the info discussed, the bizarre atmosphere of Las Vegas and want to | |
| check it out in person? Load up your laptop muffy, we're heading to Vegas! | |
| Here is what Three out of Three people said about last years convention: | |
| "DEF CON I, last week in Las Vegas, was both the strangest and the best | |
| computer event I have attended in years." -- Robert X. Cringely, Info World | |
| "Toto, I don't think we're at COMDEX anymore." -- CodeRipper, Gray Areas | |
| "Soon we were at the hotel going through the spoils: fax sheets, catalogs, | |
| bits of torn paper, a few McDonald's Dino-Meals and lots of coffee grounds. | |
| The documents disappeared in seconds." -- Gillian Newson, New Media Magazine | |
| DESCRIPTION: | |
| Last year we held DEF CON I, which went over great, and this year we are | |
| planning on being bigger and better. We have expanded the number of | |
| speakers to included midnight tech talks and additional speaking on Sunday. | |
| We attempt to bring the underground into contact with "legitimate" speakers. | |
| Sure it's great to meet and party with fellow hackers, but besides that we | |
| try to provide information and speakers in a forum that can't be found at | |
| other conferences. | |
| While there is an initial concern that this is just another excuse for the | |
| evil hackers to party and wreak havoc, it's just not the case. People come | |
| to DEF CON for information and for making contacts. We strive to distinguish | |
| this convention from others in that respect. | |
| WHAT'S NEW THIS YEAR: | |
| This year will be much larger and more organized (hopefully) than last year. | |
| We have a much larger meeting area, and have better name recognition. | |
| Because of this we will have more speakers on broader topics. Expect | |
| speaking to run Saturday and Sunday, ending around 5 p.m. Some of the new | |
| things expected include: | |
| > An Internet connection with sixteen ports will be there, _BUT_ will only | |
| provide serial connections because terminals are too hard to ship. So | |
| bring a laptop with communications software if you want to connect to the | |
| network. Thanks to cyberlink communications for the connection. | |
| > There will be door prizes, and someone has already donated a Cell Phone | |
| and a few "Forbidden Subjects" cd ROMs to give away, thanks to Dead Addict. | |
| > Dr. Ludwig will present his virus creation awards on Sunday. | |
| > A bigger and better "Spot The Fed" contest, which means more shirts to | |
| give away. | |
| > More room, we should have tables set up for information distribution. | |
| If you have anything you want distributed, feel free to leave it on the | |
| designated tables. Yes, this year there will be a true 24 hour | |
| convention space. | |
| > A 24 hour movie / video suite where we will be playing all type of stuff. | |
| VHS Format. Mail me with suggested titles to show, or bring your own. | |
| We'll use a wall projector when not in use by speakers. | |
| > Midnight Tech Talks on Friday and Saturday night to cover the more | |
| technical topics and leave the days free for more general discussions. | |
| WHO IS SPEAKING:============================================================= | |
| This list represents almost all of the speakers verified to date. Some | |
| people do not want to be announced until the event for various reasons, or | |
| are waiting for approval from employers. A speaking schedule will go out | |
| in the next announcement. | |
| Philip Zimmerman, Notorious Cryptographer & Author of PGP. | |
| Dr. Ludwig, Author of "The Little Black Book of Computer Viruses," and | |
| "Computer Viruses, Artificial Life and Evolution" | |
| Loyd Blankenship (The Mentor), Net Running in the 90's and RPG. | |
| Padgett Peterson, Computer Enthusiast, Anti-Virus Programmer. | |
| The Jackal, A Radio Communications Overview, Digital Radio and the Hack Angle. | |
| Judi Clark, Computer Professionals for Social Responsibility. | |
| Gail Thackery, (Of Operation Sun Devil Fame), Topic to be Announced. | |
| To be Announced, The Software Publishers Association, Topic to be Announced. | |
| Toni Aimes, Ex U.S. West Cellular Fraud, Cellular Fraud Topics. | |
| Mark Lotter, Cellular Enthusiast, Hacking Cell Phones. | |
| Lorax, The Lighter Side of VMBs. | |
| Peter Shipley, Unix Stud, Q&A on Unix Security. | |
| George Smith, Crypt Newsletter, Virus Topic to be Announced. | |
| Cathy Compton, Attorney, Q&A Surrounding Seizure Issues, Etc. | |
| John Littman, Reporter and Author, Kevin Poulson, Mitnick, and Agent Steal. | |
| Red Five & Hellbender, Madmen With a Camcorder, Who Knows? | |
| Erik Bloodaxe, Phrack Editor, Wierd Wireless Psycho Shit.. Stay Tuned.. | |
| There should be a few round table discussions on Virus, Cellular, Unix and | |
| something else surrounding the industry. | |
| I'll name the rest of the speakers as they confirm. I'm still working on | |
| a few (Two?) people and groups, so hopefully things will work out and I can | |
| pass the good news on in the next announcement, or over our List Server. | |
| ============================================================================ | |
| WHERE THIS THING IS: | |
| It's in Las Vegas, the town that never sleeps. Really. There are no clocks | |
| anywhere in an attempt to lull you into believing the day never ends. Talk | |
| about virtual reality, this place fits the bill with no clunky hardware. If | |
| you have a buzz you may never know the difference. It will be at the Sahara | |
| Hotel. Intel is as follows: | |
| The Sahara Hotel: 1.800.634.6078 | |
| Room Rates: Single/Double $55, Triple $65, Suite $120 | |
| (Usually $200) + 8% tax | |
| Transportation: Shuttles from the airport for cheap. | |
| NOTE: Please make it clear you are registering for the DEF CON II | |
| convention to get the room rates. Our convention space price is | |
| based on how many people register. Register under a false name if | |
| it makes you feel better, 'cuz the more that register the better for | |
| my pocket book. No one under 21 can rent a room by themselves, so | |
| get your buddy who is 21 to rent for you and crash out. Try to contact | |
| people on the Interactive Mailing List (More on that below) and | |
| hook up with people. Don't let the hotel people get their hands on | |
| your baggage, or there is a mandatory $3 group baggage fee. Vegas | |
| has killer unions. | |
| OTHER STUFF: | |
| I'll whip up a list of stuff that's cool to check out in town there so if for | |
| some reason you leave the awesome conference you can take in some unreal | |
| sites in the city of true capitalism. If anyone lives in Las Vegas, I | |
| would appreciate it if you could send a list of some cool places to check out | |
| or where to go to see the best shows and I'll post it in the next | |
| announcement or in the program | |
| -> I am asking for people to submit to me any artwork, pictures, drawings, | |
| logos, etc. that they want me to try and include in this years program. | |
| I am trying to not violate any copyright laws, but want cool shit. Send | |
| me your art or whatever and I'll try and use it in the program, giving you | |
| credit for the work, of course. Please send it in .TIF format if it has | |
| more than eight bit color. The program will be eight bit black and white, | |
| -> in case you want to make adjustments on your side. | |
| PLEASE DONATE "STUFF" FOR THE GIVEAWAY: | |
| We are trying to raffle off interesting and old functional items. If | |
| you have anything such as old computers, modems, weird radio stuff, books, | |
| magazines, etc that you want to get rid of, please call or mail me with | |
| what it is, or bring it along. I don't want to waste peoples time giving | |
| away rubber bands or anything, but pretty much anything else will go. | |
| *** NEW MAILING LIST SERVER *** | |
| We've finally gotten Major Domo List Serv software working (Kinda) and it | |
| is now ready for testing. MTV spent a lot of time hacking this thing to work | |
| with BSDi, and I would like to thank him. The purpose of the list is to | |
| allow people interested in DEF CON II to chat with one another. It would | |
| be very useful for people over 21 who want to rent hotel space, but split | |
| costs with others. Just mention you have room for 'x' number of people, and | |
| I'm sure you'll get a response from someone wanting to split costs. Someone | |
| also suggested that people could organize a massive car caravan from Southern | |
| Ca. to the Con. My attitude is that the list is what you make of it. Here | |
| are the specifics: | |
| Umm.. I TAKE THAT BACK!! The mailing list is _NOT_ ready yet. Due to | |
| technical problems, etc. I'll do another mass mailing to everyone letting | |
| them know that the list is up and how to access it. Sorry for the delay! | |
| MEDIA: | |
| Some of the places you can look for information from last year include: | |
| New Media Magazine, September 1993 | |
| InfoWorld, 7-12-1993 and also 7-19-1993 by Robert X. Cringely | |
| Gray Areas Magazine, Vol 2, #3 (Fall 1993) | |
| Unix World, ???, | |
| Phrack #44, #45 | |
| COST: | |
| Cost is whatever you pay for a hotel room split however many ways, plus | |
| $15 if you preregister, or $30 at the door. This gets you a nifty 24 bit | |
| color name tag (We're gonna make it niftier this year) and your foot in the | |
| door. There are fast food places all over, and there is alcohol all over | |
| the place but the trick is to get it during a happy hour for maximum | |
| cheapness. | |
| ============================================================================ | |
| I wanted to thank whoever sent in the anonymous fax to Wired that | |
| was printed in issue 1.5 Cool deal! | |
| ============================================================================= | |
| FOR MORE INFORMATION: | |
| For InterNet users, there is a DEF CON anonymous ftp site at cyberspace.com | |
| in /pub/defcon. There are digitized pictures, digitized speeches and text | |
| files with the latest up to date info available. | |
| For email users, you can email dtangent@defcon.org for more information. | |
| For non-net people call: | |
| ---- A L L I A N C E ---- | |
| SysOp Metalhead | |
| One Thousand One Hundred Megabytes Online | |
| 612.251.8596 USRobotics 16.8 Dual Standard | |
| Synchronet Multinode BBS Software | |
| International Informational Retrieval Guild (IIRG) Distro Site | |
| Electronic Frontier Foundation (EFF) MEMBER | |
| American Bulletin Board Association (ABBA) MEMBER | |
| ----------------------------------------------------------------------- | |
| o 200+ Message bases. No post call ratio. Nope, not ever. | |
| o FidoNet [1:282/8004] | |
| o CyberCrime international [69:4612/2] | |
| o International Networked message ECHO areas: | |
| UFO, VIRUS, REPTILE, MUSIC, Twin Cities Chat, NORML, Telephone Watch, | |
| TRADEWARS, MONTE PYTHON, FCC, NO PIRACY, CLASSIFIEDS | |
| BBS Software & SYSOP Support, MUSIC, FISHING/HUNTING, Stephen King, | |
| Programming, Computers, Foreign Language, iCE/ACiD/TRiBE, COLLEGE | |
| LIVING, POLITICS, POETRY, RACISM, and too many more to mention | |
| o Computer Underground Magazines, History, Updates & Text | |
| o DEF CON Mirrior Archive | |
| o uXu, PHANTASY, CuD, EFF Magazine(s) Distro Site | |
| o Internet email mailbox (your.name.here@f8004.n282.z1.fidonet.org) | |
| o 30 day FULL ACCESS Trial Account...$10/year MEMBERship (sub. to change) | |
| ----------------------------------------------------------------------- | |
| For Snail Mail send to: DEF CON, 2709 E. Madison Street Suite #102, | |
| Seattle, WA, 98112 | |
| For Voice Mail and maybe a human (me), 0-700-TANGENT on an AT&T phone. | |
| A DEF CON Mailing list is maintained, and the latest announcements are mailed | |
| automatically to you. If you wish to be added to the list just send email | |
| to dtangent@defcon.org. | |
| ============================================================================= | |
| (Note, I have put a copy of Dr. Ludwig's new KOH Data security encryption | |
| Virus online at the DEF CON ftp site in /pub/defcon/KOH along with full | |
| documentation. Get CrAzY.) | |
| VIRUS CREATION AWARDS: | |
| Announcing | |
| The | |
| Second International Virus Writing Contest | |
| Sponsored by | |
| American Eagle Publications, Inc. P.O. Box 41401 | |
| Tucson, AZ 85717 USA | |
| and | |
| The Crypt Infosystems BBS | |
| +1 (818) 683-0854 | |
| *** The Goal *** | |
| The purpose of this contest is to write a fully functional computer virus that | |
| entertains people with political satire. Viruses will be judged on the basis | |
| of originality, creativity, functionality, and political incorrectness. | |
| *** Eligibility *** | |
| Anyone who can write a computer virus is eligible. | |
| *** Contest Dates *** | |
| The contest is underway from January 1, 1994 until June 30, 1994. Your | |
| submissions must be received by June 30 to qualify. The winner of the | |
| contest will be announced at the DEFCON conference in Las Vegas, July 22-24, | |
| 1994. If you can be present, an official award will be bestowed on you at | |
| that time. | |
| ************************************************************* | |
| Details | |
| ************************************************************* | |
| The philosopher Friedrik Nietzsche once said that if you want to kill | |
| something, you must laugh at it--and laugh at it deeply. So there should be | |
| little wonder that political satire is as old as politics itself. | |
| Is there something going on in the political arena that you abhor, that makes | |
| you sick, that is just plain wrong? Well, here's your chance to make a | |
| mockery of it. I've always had this idea that if someone wrote a sufficiently | |
| witty virus that really addressed the issues the way the people (not the | |
| press, not the politicians) saw them, it might just get passed around by | |
| people voluntarily. | |
| Let's find out. | |
| Write a virus that is itself a political satire. I don't mean a virus that | |
| simply displays a message. I mean a living entity whose every move--whose | |
| every action--is politically motivated. If you need more than one virus to | |
| make your point--perhaps two viruses working together, or something like that, | |
| that is fine. | |
| ----------------------------------------------------------- | |
| Let me give you a simple example: The Political Correctness Virus | |
| This virus is a spoof on the "political correctness" movement--which is just | |
| a form of self-imposed censorship--that is sweeping American intellectual | |
| circles, particularly colleges and universities. | |
| This virus is a memory resident boot sector virus which maintains a list of | |
| politically incorrect words on your computer system. It also hooks the | |
| keyboard interrupt and monitors every keystroke you make. If you type a | |
| politically incorrect word into the computer, the PCV springs into action. | |
| Politically incorrect words are ranked at three different offense levels. | |
| When the PCV encounters such a word, it determines what offense level that | |
| word is, and acts accordingly. | |
| The least offensive words merely register a beep. More offensive words cause | |
| a beep to sound for 10 seconds. The most offensive words cause a siren to | |
| sound for two minutes, locking the system for that duration. If you turn the | |
| computer off before the two minutes are up, the virus will stop the boot | |
| process for five minutes, with sirens, when you turn it back on. If you allow | |
| the siren to complete, then you can proceed. | |
| The virus has two different word lists, both stored in an encrypted and | |
| compressed format. The list is selected at random when the system is | |
| infected, after which it cannot be changed. The first list is the "proper" | |
| list of political correctness no-no's. For example, a word like "sodomite" is | |
| among the worst possible offenses. The second list is an inverted list of | |
| no-no's. This list trys to force you to use "sodomite" by flagging words | |
| like "gay" and "homosexual" as no-no's. | |
| If you allow the PCV to live in your system for three months without getting | |
| a single flag, you are given the supreme honor of viewing the word list | |
| assigned to you and adding a word to it. If you get more than 3000 flags in | |
| a lifetime, the virus will force you to enter a politically correct word | |
| before allowing you to start the computer, since you are obviously unwilling | |
| to submit to its censorship. | |
| The virus also uses powerful means to prevent disinfection, so that, once you | |
| get it, you can't get rid of it without a major effort. | |
| ------------------------------------------------------------ | |
| Now, I know you can get a lot more creative than this--so do it! Design your | |
| virus carefully, so that everything it does has meaning. Then send it in. | |
| Here are the criteria we'll use: | |
| 1. Originality: Your virus must be an original work. Do not send us anything | |
| that is not 100% yours. Your message should be original too. Do not just | |
| ape what everybody else is saying, especially the media. Also, a refined wit | |
| is much to be preferred over vulgarity. Vulgarity is a substitute for | |
| original wit. Foul language, porn, etc., are out. Destructive features should | |
| be incorporated only if they are VERY appropriate (perhaps if you are | |
| commenting on real live genocide in your country, or something like that). | |
| In general, though, destructive features will hurt you, not help you. The one | |
| exception is modifying anti-virus programs. That is considered to be | |
| CONstructive activity. | |
| 2. Creativity: Make us laugh, make us cry. Amaze us with how bits and bytes | |
| can say something about politics and issues. Think of it like this: | |
| displaying a message on the screen is like reading a text file. What we want | |
| is the equivalent of a multi-media extravaganza. Use all the system's | |
| resources to tell your message. Don't be afraid to write a virus that has | |
| some weird mode of infecting programs that tells a story, or to write one | |
| that sends faxes to the White House, or sends an automatic request for reams | |
| of free information to some government agency. | |
| 3. Functionality: The virus has to work. If it only works on some machines, | |
| or under some versions of DOS, or what-not, then that will count against | |
| you. The better it is at infecting systems and moving around, the better off | |
| you will be. So, for example, if you write a file-infector, make sure it can | |
| jump directories, and--if you're up to it--migrate across a network. | |
| 4. Political incorrectness: Since computer viruses are politically incorrect, | |
| their message should be too. If you send us a pro-establishment virus, then | |
| you will not win this contest. A word to the wise: think twice about what's | |
| correct and what's not. Many positions are only superficially incorrect, | |
| though they are really quite fashionable among the establishment. Look at it | |
| this way: if you could get a well-written letter expressing your view | |
| published in a big city newspaper, then it's not sufficiently incorrect. | |
| There are a LOT of ideas that are unofficially censored by society-- | |
| especially the media and academia. They tend to make themselves out to be the | |
| rebels, but they are really the establishment. If you can't think of anything | |
| creatively incorrect and sufficiently obnoxious then you shouldn't be writing | |
| viruses in the first place. | |
| ************************************************************* | |
| How to Submit an Entry | |
| You may mail your entry to American Eagle Publications at the above address, | |
| or you may e-mail it to ameagle@mcimail.com. Alternatively, you can submit it | |
| by dialing the Crypt Infosystems BBS and uploading it there. To get on to the | |
| system quickly, efficiently and anonymously, log on as VIRUS, using the | |
| password CONTEST. | |
| An entry consists of: | |
| 1. A complete copy of your virus, both source and executable files. | |
| 2. If the political satire isn't perfectly obvious, send a verbal description | |
| of how the virus works and why it does what it does. This is especially | |
| important if you are not an American and you are commenting on something that | |
| has not received worldwide attention. I don't care if you're Bulgarian and | |
| you're commenting on something we've never heard of--just make sure you | |
| explain it, or we won't understand and you'll lose. | |
| 3. If you want to be recognized for your work, include your name (real or | |
| handle), and a way we can get in contact with you. | |
| By submitting an entry, you grant American Eagle Publications, Inc. the right | |
| to publish your virus in any form. You agree not to make your virus public | |
| prior to July 25, 1994. If you do, you are automatically disqualified from | |
| the contest. | |
| For the sake of privacy, you may encrypt your entry and send it in with the | |
| following PGP key (which we highly recommend if you have PGP): | |
| -----BEGIN PGP PUBLIC KEY BLOCK----- | |
| Version: 2.1 | |
| mQCNAi09jVgAAAEEAN3M9LFQXeBprkZuKo5NtuMC+82qNd3/8saHLO6iuGe/eUai | |
| 8Vx7yqqpyLjZDGbAS7bvobrcY3IyFeu8PXG4T8sd+g81P0AY0PHUqxxPG3COvBfP | |
| oRd+79wB66YCTjKSwd3KVaC7WG/CyXDIX5W6KwCaGL/SFXqRChWdf2BGDUCRAAUR | |
| tApDT05URVNUXzk0 | |
| =Z20c | |
| -----END PGP PUBLIC KEY BLOCK----- | |
| Good luck! | |
| **************************************************************** | |
| P R I Z E S | |
| In addition to instant worldwide fame and recognition, you'll get: | |
| 1. A cash prize of $100 US. | |
| 2. A year's subscription to Computer Virus Developments Quarterly. | |
| 3. Your virus will be published in Computer Virus Developments Quarterly, | |
| and other fine journals. | |
| 4. A handsome engraved plaque recognizing your contribution to the betterment | |
| of mankind. | |
| 5. A free secret surprise that we cannot tell you about right now, valued | |
| at $100. | |
| Two runner-ups will receive the secret surprise. | |
| !! GO FOR IT !! | |
| ============================================================================= | |
| STUFF TO SPEND YOUR MONEY ON: | |
| > Tapes of last years speakers (four 90 minute tapes) are available for $20 | |
| > DEF CON I tee-shirts (white, large only) with large color logo on the | |
| front, and on the back the Fourth Amendment, past and present. This is | |
| shirt v 1.1 with no type-o's. These are $20, and sweatshirts are $25. | |
| > DEF CON II tee-shirts will be made in various colors this year, including | |
| a few long sleeve shirts. Sizes will be in XL only again, with few white | |
| larges made. Shirts will be $15, Long Sleeve $17, Sweat shirts will be $20. | |
| Well, actually, I'll make a small quantity of various stuff, so with luck | |
| you'll find something you like. | |
| > We will have a few (ten maybe?) embroidered hats with this years logo. | |
| Not sure how much they will be.. like $10 maybe. | |
| > Full sized 4 color DEF CON II wall posters will be for sale for about $5. | |
| > Pre-Register for next year in advance for $15 and save half. | |
| > Make all checks/money orders/etc. out to DEF CON, and mail to the address | |
| above. Way above. Above the virus awards announcement. | |
| If you have any confidential info to send, use this PGP key to encrypt: | |
| -----BEGIN PGP PUBLIC KEY BLOCK----- | |
| Version: 2.3 | |
| mQCrAiyI6OcAAAEE8Mh1YApQOOfCZ8YGQ9BxrRNMbK8rP8xpFCm4W7S6Nqu4Uhpo | |
| dLfIfb/kEWDyLreM6ers4eEP6odZALTRvFdsoBGeAx0LUrbFhImxqtRsejMufWNf | |
| uZ9PtGD1yEtxwqh4CxxC8glNA9AFXBpjgAZ7eFvtOREYjYO6TH9sOdZSa8ahW7YQ | |
| hXatVxhlQqve99fY2J83D5z35rGddDV5azd9AAUTtCZUaGUgRGFyayBUYW5nZW50 | |
| IDxkdGFuZ2VudEBkZWZjb24ub3JnPg== | |
| =ko7s | |
| -----END PGP PUBLIC KEY BLOCK----- | |
| - The Dark Tangent | |