Re: Thawte SuperCerts

1999-12-02 Thread EKR
"Steven M. Bellovin" [EMAIL PROTECTED] writes: In message [EMAIL PROTECTED], EKR writes: I'm assuming it's compiled into the code, since if it were in the cert database, it could be tampered with. Sure -- just like Fortify can't exist... Fair enough. I would have kind of expected the

Re: Semantic Forests, from CWD (fwd)

1999-12-02 Thread bram
Maybe I'm just dense, but what's with the emphasis on phone conversations? Voice processing is flaky at best, and computationally expensive regardless. Faxes, on the other hand, can be OCR'ed easily, and email is in plaintext to begin with. -Bram

Re: Thawte SuperCerts

1999-12-02 Thread Rich Salz
unless, of course, there's a built-in list of trusted CAs. That's exactly what it is. Patching the list is apparently pretty easy for Netscape Navigator -- instructions are included in the mod_ssl Apache patch -- but it's not currently known what needs to be done to make IE add a trusted CA.

SuperCert clarifications

1999-12-02 Thread Mark Shuttleworth
Hi all Saw some traffic on this list about our announcement of SuperCerts. Yes, we have a full SGC licence, and have only been waiting for browser revisions to be released that recognized our certs for 128-bit sessions. Nav 4.7 and MSIE 5.01 now do this, hence our announcement. Our licence

Re: Thawte SuperCerts

1999-12-02 Thread Enzo Michelangeli
Marcus, The answers to your questions, and more, are at: http://www.modssl.org/source/exp/mod_ssl/pkg.mod_ssl/README.GlobalID Cheers -- Enzo - Original Message - From: Marcus Leech [EMAIL PROTECTED] To: Radia Perlman - Boston Center for Networking [EMAIL PROTECTED] Cc: [EMAIL

Re: Thawte SuperCerts

1999-12-02 Thread Ben Laurie
Marcus Leech wrote: So: two questions (with a possible answer of "use the source, luke"): o What bits are set in a "super cert" to indicate that it's a SGC or step-up cert? Or is it simply that certs issued by a super-cert authority (as marked in the browser CA cert database)

Export control of Java VM ??

1999-12-02 Thread Ron Rivest
Here's a thought exercise: What happens if someone applies for an export license for a Java Virtual Machine, which he intends to use as an "encryption routine"? The idea (which is not new) is that a Java program (Java byte code) would be the "key" for the encryption. It specifies how to turn

Re: Semantic Forests, from CWD (fwd)

1999-12-02 Thread Arnold G. Reinhold
At 1:34 PM -0800 12/1/99, Udhay Shankar N wrote: From: [EMAIL PROTECTED] Date: Wed, 1 Dec 1999 15:18:43 -0500 To: undisclosed-recipients: ; CyberWire Dispatch // (c) Copyright 1999 // November 30 Sender: [EMAIL PROTECTED] Precedence: bulk X-Loop: [EMAIL PROTECTED] Jacking in from the "Sticks

Re: Siemens German Digital Signature Chip Hacked

1999-12-02 Thread Peter Gutmann
[I posted this earlier today but it never appeared, apologies if you've seen it before. In any case the bit about the SigG card has been updated] Martin Minow [EMAIL PROTECTED] writes: The Register http://www.theregister.co.uk reports that the Siemens Digital Signature Chip used for cashless

Re: Semantic Forests, from CWD (fwd)

1999-12-02 Thread Udhay Shankar N
At 20:49 12/01/1999 -0800, bram wrote: Maybe I'm just dense, but what's with the emphasis on phone conversations? Voice processing is flaky at best, and computationally expensive regardless. Faxes, on the other hand, can be OCR'ed easily, and email is in plaintext to begin with. Probably (I do

Re: Export control of Java VM ??

1999-12-02 Thread Russell Nelson
Ron Rivest writes: (*) A Post tag system has a number of rewrite rules of the form L_i -- R_i where L_i and R_i are strings over some alphabet (e.g. binary). As long as the prefix of the input matches some L_i, that L_i is removed from the beginning of the input, and

Re: Export control of Java VM ??

1999-12-02 Thread Ian Goldberg
In article [EMAIL PROTECTED], Ron Rivest [EMAIL PROTECTED] wrote: If no per-key approval is needed, then I don't see why one can't distribute code that embodies a fixed transformation procedure, since this is really a "key" rather than a "program". That is, the distributed specifies a single

Re: Export control of Java VM ??

1999-12-02 Thread Ben Laurie
Ron Rivest wrote: Here's a thought exercise: What happens if someone applies for an export license for a Java Virtual Machine, which he intends to use as an "encryption routine"? The idea (which is not new) is that a Java program (Java byte code) would be the "key" for the encryption.

Re: Semantic Forests, from CWD (fwd)

1999-12-02 Thread Bill Stewart
At 10:42 AM 12/02/1999 -0500, Arnold G. Reinhold wrote: http://www.dragonsystems.com/products/audiomining/ "New AudioMiningĀ Technology Uses Award-Winning Speech Recognition Engine to Quickly Capture and Index Information Contained in Recorded Video Footage, Radio Broadcasts, Telephone