-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
At 03:31 PM 2/14/01 +0200, Paul N wrote:
It is secure to make a onetime pad using 16 bit input from soundcard using
the following algorithm?
Each bit of the output is the result of XOR-ing all 16 bits from the input
sample... so, for making one
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
http://world.std.com/~cme/html/padlock.html
It's self-explanatory.
-BEGIN PGP SIGNATURE-
Version: PGP 6.5.2
iQA/AwUBOnSoNXPxfjyW5ytxEQLviwCfahPcp0FGP+1UB4cs0J6MlN2Em20AoMhq
CHIn1FgxwKhGz8LR9S6WzSkF
=/Izn
-END PGP SIGNATURE-
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
At 05:28 PM 1/25/01 -0600, (Mr) Lyn R. Kennedy wrote:
First the basics:
1. An electronic election system need only be as good as the current
system. While perfection remains the goal, the minimum criteria
is that it be no worse.
After
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
At 05:29 AM 1/22/01 GMT, David Wagner wrote:
Free markets may be the best hope we've got (or they may not), but
in any case, wouldn't it be fair to say that reliance on free markets
to eliminate content protection is a little risky?
[...]
Now
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
At 06:40 PM 12/13/99 -, lcs Mixmaster Remailer wrote:
However this is just the first step in an effective compromise. Now you
need to get him to use a bogus certificate when he thinks he is using
a good one. He tries to connect to a secure
-BEGIN PGP SIGNED MESSAGE-
At 02:26 PM 5/8/99 -0700, EKR wrote:
Carl Ellison [EMAIL PROTECTED] writes:
Source code is human speech, for human-to-human communication. It has a
side-effect of being compilable into machine code, but it is in a human
language and is intended for human
From my declaration for the Bernstein case:
http://www.eff.org/pub/Privacy/ITAR_export/Bernstein_case/Legal/960726_filing/ellison.decl
"18. Attached hereto as Exhibit C is an excerpt from the August
1967 CACM, giving another example of an article which consists solely of
source code.
At 09:18 PM 5/7/99 -0700, Jay D. Dyson wrote:
-BEGIN PGP SIGNED MESSAGE-
On Fri, 7 May 1999, Anonymous wrote:
Here's Lance Rose's take on the Bernstein decision:
Sorry to say, but the 9th Circuit took the dumb approach I mentioned in my
earlier post.
Their whole approach
M Taylor wrote:
In my limited experience of dealing with administrators, they question why
they should worry about privacy of other people's personal information,
citing the general rise in data warehousing and the old saying "if you've
got nothing to hide..."
So I'm looking for pieces
-BEGIN PGP SIGNED MESSAGE-
Oops -- I didn't mean to send that last reply to the whole list. Oh well.
Although I share your anger and desire for a show-down, I worry about the
result. Back when the Clipper chip was fresh in the papers was the time for
this showdown. There is so
10 matches
Mail list logo