💾 Archived View for spam.works › mirrors › textfiles › uploads › vosd.txt captured on 2023-06-16 at 21:00:06.
-=-=-=-=-=-=-
[Future Viruses and Operating System Development] [Conceived and expressed by nucleii (c) 2001] [Abstract] "The best prophet of the future is the past." --unknown Since the beginning of documented times man has been trying to simplify things. This process requires abstract thinking. Coming up with new ideas outside of the norms. Creativity. This process has caused humanity to advance far beyond its roots of basic needs and survival. Although living in a world based on technology, new problems have arose. The rate seems faster than our ability to solve and correct the obstacles. Has the modern society created a problem with no solution? A world of striving towards perfecting a system that should instead be torn down... [Introduction] The new millennium. 2001. Space odyssey my ass. None the less its been an interesting year for the modern world... Encryption, networking, theft, espionage, destruction, demonstration protest. These are just a few of the topics i will explore here. I will attempt to touch on what has been happening over the past few years, and cover where i feel the trend will take us. The topics of the anti virus industry and the consumer are covered. I have also included several of my viral ideas which i will never actually get around to implementing. For all you programmers out there, this is an open invitation to do so yourself. This paper is not meant to be viewed as a complete guide. Its just a simple implementation of my personal ideas as theory. This should not be taken as anything more or less. [A Brief Past] The 80's. The turning point for computing. This is the decade the personal computers were creeping into the homes of america. The commadore64, tandy machines with tandy dos, ibm with their pc-dos, apple 1 and 2 e's. The list goes on and on. In the early days of home computing there was much more variety. Nothing had really dominated the market like today. This was also the decade the first computer viruses were found in the wild. The technology was simple. Basic mbr/bs infection. With the idea in the minds of computer users around the world, programmers became interested. The advancement of the computer virus had grown from sector infection to various file types and even directory infection. Different schemes for spreading, stealth, encryption and other self modifying code were implemented. The virus and anti virus community grew together. The virus programmers were, and still are, always a step ahead. Various dos distributions did what they thought was the right thing. Ibm and msdos started including versions of their own anti virus software. A good step, but in the wrong direction. A way to boost a new industry? Whenever developers create software for an operating system, it increases the user base. I really hope this didnt play as a factor... and its far too late to ever know. Why not start enforcing a set of rules on the dos os. It was obvious that a read only attribute was not enough. The systems allowed any piece of code to take complete control. Seems like it was doomed from the start. Why continue development keeping the same base. It was totally possible to change the kernel to restrict what goes on. They didnt have to change the file format. They didnt have to change the interrupt system. Only the way the kernel executed software. Why give complete control to something that really doesnt need it. Even more interesting, why not fix a problem that everyone knew would continue to affect the future. I could rant for 300 kb about the history of viruses... but i wont. That would be way too much effort and a huge waste of time. If you want your history, go get it. The information is freely available via the internet. Read up. Be aware of where your coming from. [The Present Virus Trend] Times are strange. The microsoft os based virus writing movement is in a major change for the first time since the start of the game. Over the past five years we have seen a change in the trend of 16 bit and 32 bit virus production. People who are new to the scene are usually releasing win32 pe infectors instead of dos com appenders as their first virus. What was once saved as a "later learning" item has now become standard in the field. Microsoft has been working dos out, and virus writers have been working win32 in. This 32 bit platform has opened up a whole new world of opportunity. Not only did it increase the amount of executable formats one could infect, it also released more power. Thirty two bit applications have allowed more effective ways of encryption, trapping of other applications, effective tcp/ip packet building, so on and so forth. The os is much more robust. As an expected result, except by microsoft, the virus technology is much more advanced. Just look at a wildlist ( www.wildlist.org ) from february 1997 and then take a glance at the august 2001 edition. The first thing you should notice is the frequency of os specific code. In february 1997, two years after the release of windows 95, about 95 percent of the viruses "reported" to be in the wild are dos based viruses. Of the 239 viruses on the list, 28 are microsoft office based, and a few others are win16 ne infectors. Notice that Dir_II.A is still on this list. A virus that cannot spread on machines running anything above msdos 4.*. Now go back to august 2001. Of the 208 viruses "reported" to be in the wild, about 15 are dos based viruses. That is a drastic change in a matter of 5 years when its compared to the change between 1995 and 1997. Not to mention the sharp rise in the amount of viruses that are software dependent. As stated before, the count jumps from 28 in the wild in 1997, to about 155 in 2001. So the technology has been around for a few years. It just takes a little while for it to be widely implemented. The present virus trend is really based around what other virus writers are doing. Just like a bad fashion. A new idea is implemented. If it gets enough attention, either by the media or other programmers, it will be used again. This is not really a bad thing, but it does not give rise to originality. The main problem with this in the virus world is that most programmers dont write code that even puts a spin on the old idea. Its just written in different style code and released again. [The Present OS Trend] Microsoft Windows based operating systems. When i say windows based i mean everything from 95 to nt to win2k. Think generic for a while. Enterprise computing is the strong point of the current market. This has lead to need, of course, for enterprise software. The business world has been backed by mainframe computing and different flavors of unix like operating systems. The windows nt family has been pushing iis for a while, but microsoft has always been lacking enterprise software. Over the past few years there has been a strong development of other services targeted to business, not desktop, computing on the windows platform. I feel the future is bleak for variety in the business world. Windows has had a stronghold on the desktop market for a while now. Trading in stability and functionally for ease of use turned out to be a great marketing scheme. I hope that windows doesnt take hold of the server market as well. That is not the direction i want to go in with this paper though so i just leave that topic alone. Linux on the desktop has gained momentum. Every day we see some useful advance. There is also finally major backers of linux. Look around the subway flats in new york city. IBM has ads plastered everywhere of their "peace, love, and linux" campaign. Not to mention its price. Big business is starting to look at linux for a free solution for their once expensive to replace servers. We are also seeing FreeBSD and other major players in the unix and server os world to slowly become more geared for desktop use. There have also been twists on that rule like macintosh using a bsd like kernel as the base for their latest os release. I wish i could say i knew where all this was headed for better or for worse. We will have to wait and see what the next move is. The buzz word has changed from "internet" to "multimedia" in the new millennium. From web content, to video on demand, to old technologies being widely implemented such as voice over ip. Eye and ear candy. Everything is gui and everything makes a stupid bling noise when you click on it. Mention "real time" and its all over. I think its a shame that its so difficult to get people to develop for operating systems other than windows. Think about what could have happened with BEos with a better marketing campaign and contracted software development. Think about what could happen if it was shipped with any major pc manufactures. Everyone blames microsoft, including me, because its easy. Im not saying they played well, or even fair, with others. I am saying its a world wide problem. Its up to software developers. Its up to home and business users. Its up to the people who are shipping their latest pc deal without any option of os. Rome could only last for so long... All in all, its a safe bet to say that windows will continue to be the industry standard for desktop computing over the next several years. The current change only seems to be what people are doing with their "desktop" computers. With the availability of broad band growing, people are using their home computers to offer network services to the internet. Mainly in the form of web servers, but many home computers are also offering things like smtp, nfs, and other hard disk and file sharing services. This has changed the way the internet functions. It has changed the way networking functions. It has changed the way viruses function. [Current Virus Technology] Now we have seen what has changed in the virus and operating system world. We have also reviewed the software thats currently being ran on these systems. Lets now look at the virus techniques that are currently being implemented. I will try and keep this generic and not sway too much into what technologies have been implemented in what file format or software package. This will be brief and will only cover a few of the basics. Encryption and polymorphism. Household terms in the virus writing world. No virus seems to be complete without. The MtE changed the way anti virus software had to perform. From simple scan strings to the world of heuristic and emulation. Protection from prying eyes. I feel the use of strong cryptography is the future. People like spanska took a step when IDEA was implemented in viral code. However, this has not become standard practice. The only real problem is where to hide the key. It doesnt matter if its RSA or an 8 bit xor loop. Both algorithms have become equal when there is a pointer directly to the key. There are several ways to obscure this, but all in all, its a trivial task to decrypt viruses for that reason. This is why other self modifying code techniques are so important. Polymorphism is a perfect example. Lets say your engine writes a different style and size decrypter for several different algorithms it can choose from. Lets also say that it retrieves its keys from different places on disk. That alone creates a whole new world of problems for those that want to decrypt your code. Again, this will only delay someone who understands anything about current microsoft based operating systems. There is still nothing keeping someone from taking a snapshot of the decrypted virus code from memory. Another massive weak point. Even if the virus only decrypts instructions a step before they are executed, they can still be copied. Not to say this isnt a good idea. Its been done in the past and been proved very effective. A great way to make it difficult to examine a program, even after its discovery. Anti debugging, anti heuristics, anti emulation, fooling with the stack, attacking common disassemblers, and other such protection techniques will also only delay the process of effective detection. These are all viable techniques, but dont seem to be implemented as much as they should. Its basic protection. I feel that stability and effective protection are the keys to a long life in the wild. Propagating is almost a secondary issue. I have failed to mention stealth methods for a good reason. Almost all of the well know stealth technology was for the ms dos operating system. These techniques no long work under windows. The new device drivers and api system has taken priority away. Im not saying there are not ways to stealth things under window anymore, just that its not practical. Its the same as master boot record and boot sector infection. The medium these viruses used to spread is no longer in widespread use. Think when the last time you gave a file to someone via floppy disk. Even better is to think about the last time you tried to boot off of a dos based floppy, or left one in your machine. I feel that boot sector infection has almost become another way of sustaining the existence of a discovered infection. Networking enabled viruses have become a standard issue item. What once has been saved for strictly worm code has now been implemented as a basic component in viruses. Im sure i speak for all of us when i say if i see one more virus exploiting outlook in the media im going to vomit. This is a logical step though. Nobody can deny that. The growth of home networking proves the point. Long gone are the days when people needed to pass files through physical means. Why wait when you dont have to. Why send text through the post office. It takes weeks for a response. Sending text and other forms of media via electronic methods can be done over tcp/ip in a matter of seconds. Not to mention that its much more cost efficient. Back to the subject, its not just ms outlook thats being exploited. IRC clients have also been popular to exploit. Mirc and pirch are the main targets. There are many viruses that are aware of network drives and other remote devices. Another common attack has been to infect web content. Java class files, html, and other web elements have been infected. The latest media blast was centered around the code red worm. This piece of code used a buffer overflow in microsofts iis to infect servers. The threat of network enabled viruses grows every year and is only going to become a bigger problem. One of the more interesting things ive seen happen is the advent of what has been dubbed "espionage enabled" viruses. I first saw this from a macro virus from opic that stole secret pgp keyrings and uploaded them to a web server. Similar practice has been used to steal unix passwd files, windows pwl files, and other such wanted material. The current virus glut is compiled of hybrids of the past. Using old techniques with cutting edge ideas. There are a handful of thinkers that are on the forefront of the game. New infection routines bundled with new ways of obscurity. However, most viruses are just recycled material from years ago. [The Future OS] The future of operating systems has always been built around user demands. Most commercial developers are not interested in the good of mankind or computing. Programming is a paycheck. It does not really matter how well the product is coded. Its just a matter of meeting user needs. To sell. To keep the boss happy, the stocks high, and the people buying. Once a user base is established the goals are limited. All that is needed is to keep them interested in buying upgrades and marketing to new users. Its a lot easier said than done, but that's all that really matters. Getting new clients and keep the ones you already have. It does not matter if you create a whole new set of problems when consumers feel like they dont have another option. This is not only an issue with operating systems, but the software that runs on them as well. If the same commonly used multimedia, word processing, and database systems were offered on non windows systems, things would change. I dont think it would be an immediate change. Over time though, people would understand that learning operating systems based on the linux kernel is just as easy as learning to use windows based operating systems. Its hard for people to let go of something they are comfortable with to use a product they know little about and cannot get the software packages they know. I feel that most operating systems are going to lean closer to integrating the common forms of digital media. This ranges from basic audio and video, to things like voice recognition software. Windows has been working on this for years. Apple has continued to use this as the majority of their marketing scheme. The integration of various multimedia packages in linux distributions plays huge factor. I feel that linux is going to be a major player in the change of the market. As more development is done to meet basic user needs, the draw to the operating system will grow. Cost alone is enough to hold me as a believer. Success will be determined by meeting the home users needs. As long as strong kernel development is taking place, larger range of hardware support is added, and developers continue to write applications for the platform, things can only grow. Once there is a large enough base of free equals to popular products, the market will open up. Nobody enjoys paying for something they can have for free. The open source movement will grow to become the largest resource of software. There will always be people around who are interested in programming for a hobby. Most of those people in the open source community have no desire to make money off their work. Development can happen at a much faster rate when the code is made public, and there are thousands of people world wide looking at your problems. Others can pick up on something you have overlooked. Its not even a matter of being outsmarted. Its just the result of having a different perspective. Look at all the hands that dig into the freebsd project. From my experience, this is the most stable and best optimized kernel in the open source software community. This feat was not achieved by holding tight to ones ideas. If such effort went into software to run on these free platforms.. Windows must start over and change the way software is executed. Its obvious that the file permissions are not working out. Microsoft felt that viruses would not survive in the win32 environment. This is a problem that is not going away by simple obscurities. It will take a total rework of the system base to change anything. Even if this means they have to release an operating system that is not backwards compatible with their existing products. They do not seem to have a problem doing this with software packages. The system could be released parallel to whatever technology is currently on the market. Push it as "the future of computing" or some other gravely bold statement. Give users the option. People might not grab it at first. It will take years of software development to really push the platform. Its not an impossible task. You can move mountains. Eventually there is going to be more effort in kernel protection. The linux kernel patch from the openwall project is a perfect example. This implements such features as a non executable user stack, and will not allow shared memory segments that are not in use by a process. This solves two major problems in the linux world. Both would require a total reconstruction to implement on the windows platform. I think its sad that microsoft left the brain of their os bare. There is no end to what you can do to kernel32.dll after the system boots. Yet again, it would not be such a large issue if the platform restricted what the software running under it could do. Local and network security will finally be looked on as a critical function in a systems performance. This is a field that was hardly touched by microsoft until the nt series was released. At least then basic user rights could begin to be enforced. Something the mainframe and unix systems have been doing for decades. People are now using computers for one other major reason besides multimedia. Communication. In any situation where people are connected, there are going to be problems. Be it physical, or through distributed environments. Most major systems are built to be connected to the internet. Everything can talk to everything. I feel this is great, but without proper security, its just going to add to the problem. Any system that is build with these two things in mind will do well. Processor architecture is soon to change. Once the ia64 chips are really pushed, they will take over the home computing market. The 64 bit memory addressing will open up new doors for speed and calculations per clock cycle. The actual chip speed in megahertz will mean less than it does now. This also gives major software developers a chance to start over. New processor, new platform, and new software. Build again from the ground up. What if man had continued on trying to perfect the horse drawn buggy instead of working on developing the internal combustion engine. I truly hope microsoft sees how important and how big of a chance this really is. When your software powers 90 percent of the worlds computers, its only ethical to start looking out for the best interest of the user. Something that they have ignored for well over a decade. [The Future Virus] This is the real motivation for this paper. The part i find to be most interesting. Using the base i have just set, i will go into detail of where i feel things should go. Some of it can and will be implemented in the not so far future. The rest we will just have to wait and see. All in all, i have two main goals for this chapter. First, i hope to open up writers to new programming techniques. Second, i hope to set in peoples minds that this is a problem thats only going to get bigger. Until the populace takes action and rights years worth of wrong, these problems are not going away. To those who think they are in control, hold on. Its going to be a wild ride. Lets start with what is hot in the media right now. Viruses and worms being used to exploit network services. This is a trend that i feel will continue for years to come. Im actually surprised this has not already been a wide spread practice. It just makes sense. Millions of people connected together. Its too easy. The internet has given virus writers one large petri dish. The internet has replaced physical media. The original exchange that gave rise to widespread viral infection. This comes back to darwin, evolution, and survival. Nature will find a way. Its proved itself over and over, and now its going to flex in the meta world. This can lead us down many different paths. The world is run on information exchange. The biggest activity of the united states secret service is intelligence gathering. Viruses and worms that collect information. Why isnt (or is it?) this being used by governments? Im sure getting a file into a remote computer is a million times easier than recruiting a mole. Not to mention the safety factor. It would keep an agent out of risk, and lets face it. Computer crimes are hard to track. People make mistakes, people make computers, computers make mistakes. Using various forms of disinformation, its trivial to point the finger to someone else. One can easily create a front and use it to exploit any given target. We all know the united states government is pretty lax when it comes to network security. Most other nations are equally as poor. Its only logical that this sort of attack will take place. Welcome to the age of the digital spy. The espionage enabled virus. Covert data theft. We now live in a world where the computer virus can easily implement other functions. In the past its been pretty bland. We have seen various forms of graphics and sound, simple messages, and destructive activity as the norms of virus payloads. I hope this is a trend of the past. Networking now opens the door to so much more material. Viruses that target the credit card databases of any given windows based online shopping package. All the little dot coms being ran from home iis servers off cable modems are perfect targets for such activity. Next you must consider all the other software packages that can be exploited in such a fashion. Data of all flavors can be harvested. Dont forget the other things many home users have on their machines. I like the idea of viruses that steal dial up access information. If you can get the login, password, and at least who the provider is, your fine. Finding dns servers, phone numbers, and such is usually public information. Alot of smaller dial up providers still offer unix shells with the package which is an added bonus. This practice isnt limited to public affairs. What about viral code in the workplace? One can write code that will only infect machines on a local network. This way you could perform tasks in a controlled environment. Collect the wanted information and send it to a remote source. One could avoid detection by such means as setting a date to scan available drives and remove your viral code. This wont help much with the backups, but most businesses back up once a week or so. A week is a very large window to get what you need and clean up your tracks. The foundation of civilization is communication. Our day to day life can be throw upside down by even minor data flow disruptions. Think about how much you are bothered when your cell phone drops a call or your isp goes down for routine maintenance. These are not very critical examples but they are situations most of us have encountered. Lets say you have a wide spread virus. Most of the machines infected will be home users. Most of those users access the internet. Most of those users will never have a clue if their pc is attacking various networks via denial of service attacks. This technique has been used in the past on targets ranging from child pornography sites to the white house. Programmers can now use code as a form of protest. Im sure that it will only get negative results like more media hype for kiddies and crackers, and maybe jail time for the programmer. We all have seen the harm done by webpage defacing for "political" reasons. I can never see denial of service attacks resulting in anything positive. I must say that this is a problem that will be implemented more. There is no way around it. Im not so fond of this topic so im going to say, nuff said. I would like now to touch on the idea of plug-ins for viruses. We can thank vecna for this (any many other) technique. Start with a simple virus shell. Basic code for effective spreading, evasion, and networking. No big deal. Implement module support. Now stop laughing and shaking your head. Imagine how things would have been if CIH had some sort of module support. The virus checking various servers for updates to perform all sorts of tasks. Each client could not only receive updates for payloads, but for performance, bug fixes, alternate contact information, and so on. This would be very interesting if the project was open source and invited others to write their own modules. Why not document what your engine can do, and release simple examples to get programmers attention. Set a standard protocol for virus modules. It could get quite messy. Every year a programmer infects a file format that has been long overlooked. Various microsoft office documents, data files, and other such media is exploited. I cant help but wonder how far this can go. An idea i have always wanted to implement is to infect several files with different parts of a virus. Infect an executable file with just code to copy the virus body from a different file to memory and execute it. Store the virus body in a media file that is never scanned by default with most anti virus products. The standard JPEG file format is usually overlooked because its not an executable file. Its a perfect target to hold such code. You can leave the JPEG header alone and tack megs worth of information to the end. I have never seen this practice affect the way any program views the picture. Its much easier to tweak PE files to scan as clean when they do not contain actual viral code. There has also been greater virus activity on various unix and free "unix like" platforms. Much more on the latter. There have been several papers published on infecting the elf format. Better documentation of the linux interrupt system has also been made available. This i find very interesting. Not just because its new, but because its taken this long for people to catch on that linux is not perfect either. Although it can still be exploited, the difference is the default environment does not allow it. Simple things like limiting what an executable file can do, and restricting what can take place in memory, have curbed this so it will never become a major problem. It will most likely always continue to be an issue, but i cannot see unix viruses propagating in the wild. On another note, i see a problem with network enabled hardware. Its bad enough that people leave devices like printers and routers with their default settings or no password at all. This has not been a problem as far as viruses go, but times are changing. Video game consoles are being shipped with hard drives and pentium processors. With the advent of networked games on these devices, its just a matter of time before its exploited. The xbox is based on x86, has a hard disk, ram, and a built in network support. After kritz being spread on a dreamcast cd, i cant help but wonder when the console itself is going to be the host. I think that the future virus will be molded around networks. Virus code will use more of the resources that have been available for years. Programmers will continue to exploit things that have been ignored. The future virus will be shaped by user ignorance. It will take advantage of a generation of point and clickers. Evolution. Growth. Survival. [Conclusion] A piece of art to show flaw. An exploit on the problems of its host. The industry complains about viruses with the argument that "If kids wouldn't code them, then it wouldn't be a problem". This is only half true. The problem would still exist. Why? Because its interesting. There will always be people who want to look into the matter, to figure out just how it works, and to implement the idea themselves. Once such an exploit is known, its not going away on it's own. When such problems are found in the security industry, something is done about it. People don't just say "hey, we found a root exploit in (fill-in-the-blank), but we will just ignore it and hope nobody uses it. So why has microsoft and other operating systems allowed such problems to continue? I feel that virus programmers will always look for new problems to exploit. New places to hide. New ways of giving operation systems that have chosen to ignore security the finger. The technology that has evolved with viruses is advancing at an alarming rate. Until something drastic is done, this will be a issue that will continue to grow. Such practice of data collection, disruption, and disinformation can be used in so many different ways and motivations. The possibilities are frightening. Things have changed. The desktop operating system has changed. The networks have changed. Business has changed. Right now things could go in any direction. The future is not yet written. It is up to us to say what happens next... To write the next chapter. The power is in our hands. [Contact] Feel free to contact me. email nucleii@tfz.net irc *.undernet.org http://www.coderz.net/nucleii -----BEGIN PGP PUBLIC KEY BLOCK----- Version: PGP 6.5.8 mQGiBDff8ZkRBADKWpTlurCyaVMCAhTnIOm4pWwBgCEHDuDSnYFx+1Yrunq3Pw3m /3L6JI9YLDyuETX9nXbA4QJIWbvoNptTnneZpi0FlbgwppQvpCYnsUFw1TwpBj9B W31pSDO7RnZwcCjiCe/Tc6lmVIWoNY2KJadeR5qSrlws5a47dLZraaSrnwCg/+E/ I5k/cLj9xyCDvKaFv2myaq8D/jpHSnw6hhnpk0Gfvt4eMv2FrxU0Bl6RhbeSk/Cx eqQwTu4+VTkHFZRN/XQooXkPViVL8IBuzL2b6q6shD7Iw1By37x41MUZMeMr/FeW pIA6HHKPUWvXSkRk7B38u7FwUwnaNY6vq4qdL+q0H/xW2tGredrw6HZerhVbiZ9V BsJ4A/48Zyeo+z2YaDHKcOOVSbg3KlfUXUBeSIcukXOwIZu1xYbEr3PMeZ8ob493 LNsJtMw3JHN1Q938sl5gQaULC8wZZKcCKAgm42+s6+qVEzCC30hlfol3vgGThiaG bwUwazbViNW9GvMBStdN43rs9Fuv8L7pF6ZTSpbTmkAbWOq9xLQPbnVjbGVpaUB0 ZnoubmV0iQBLBBARAgALBQI7IrWABAsDAgEACgkQOx6SUs31GvBtUwCdEf0Sx9x1 wt9z79MRkhgTZsUzHsAAnjBcF2ObgYRntjh/4K7GaXWsdACduQINBDff8ZoQCAD2 Qle3CH8IF3KiutapQvMF6PlTETlPtvFuuUs4INoBp1ajFOmPQFXz0AfGy0OplK33 TGSGSfgMg71l6RfUodNQ+PVZX9x2Uk89PY3bzpnhV5JZzf24rnRPxfx2vIPFRzBh znzJZv8V+bv9kV7HAarTW56NoKVyOtQa8L9GAFgr5fSI/VhOSdvNILSd5JEHNmsz bDgNRR0PfIizHHxbLY7288kjwEPwpVsYjY67VYy4XTjTNP18F1dDox0YbN4zISy1 Kv884bEpQBgRjXyEpwpy1obEAxnIByl6ypUM2Zafq9AKUJsCRtMIPWakXUGfnHy9 iUsiGSa6q6Jew1XpMgs7AAICB/4ksuslS4cCNi48FilpW1LTBUf3P8YUKQJX256z NnidOlHvXy1ctJDFLS50X4et7cJeI0Prr1l011AOerSECvHaE37nYfRq/OAY9GpX QezX0ObjpM0ABaY3AexGXLu5btPAf64Pu7v3wI1IK9yuX2fyW3ctE+neLWCf2ExN Z9q4sgxi4DPSJG1oqPsphbcR7t2oOhPU3dx5CFYBIA0BwvCgbkWFxCJ2S+cWdRdQ i6DhXsEsEkRBKRhcNepewK2MsDHxO+VmdvBwEX1wy6DebjlmUAYc1iatUSIbCVLj xc/GrmY1AGEhRu0DcqEJ2nfcmMX7jTfPN2IW4Xc/7MV4u065iQBGBBgRAgAGBQI3 3/GaAAoJEDseklLN9RrwMJ4AnR+qwepM5GB9+sqXEtgvFxl6Fme1AJ9N1QluFYtj 9TExLxttoJpDgjXKNg== =xTBK -----END PGP PUBLIC KEY BLOCK-----