It seems that if you are only concerned about the length extension property,
you could make the last compression function in the chain different from all
other compression functions. For example, if sha() is the compression function
for SHA1 and md() is the compression function for RIPEMD ---
In message [EMAIL PROTECTED], Meyer Wolfs
heim writes:
-BEGIN PGP SIGNED MESSAGE-
I guess this explains the FBI's opposition to the Verio merger. I wonder
if a colocation company or service provider could be forced to disclose
its participation in the Carnivore project. Any
"Steven M. Bellovin" [EMAIL PROTECTED] writes:
In this situation, everyone's email has to be scanned in order to
isolate the desired traffic.
I've seen this claim before, and I don't think it's true. It's like
saying to wiretap my phone calls, you need to tap an entire fiber, and
do
In message [EMAIL PROTECTED], Marc Horowitz writes:
"Steven M. Bellovin" [EMAIL PROTECTED] writes:
In this situation, everyone's email has to be scanned in order to
isolate the desired traffic.
I've seen this claim before, and I don't think it's true. It's like
saying to wiretap my phone
I suspect that the reason they would want Carnivore as opposed to
looking at spool files is that it is less invasive then looking at spool
files, isn't dependent on the technology choices made by the ISP and
finally its operation is beyond the ISP's examination.
"Here just connect this to your
At 10:58 AM 7/12/00 -0400, Steven M. Bellovin wrote:
There's been speculation about NSA black boxes in such facilities for
years. The FBI, however, isn't quite as "above the law" as the NSA likes
For $500/monthly you too can have a box in various NAPs. You can
run your NIC in Bill Clinton mode,