--- begin forwarded text
Resent-Date: Mon, 12 Feb 2001 15:03:52 -0400
Date: Mon, 12 Feb 2001 14:02:42 -0500 (EST)
From: Paul Syverson [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
CC: [EMAIL PROTECTED]
Subject: FC01 E-Voting Panel Description
Resent-From: [EMAIL PROTECTED]
Resent-Sender: [EMAIL
In message 962j9b$bd5$[EMAIL PROTECTED], David Wagner writes:
* Use a VPN with strong end-to-end cryptographic authentication
and encryption (e.g., IPSEC or equivalent)
At CITI, we protect the traffic between base station and wavelan
clients via IPsec. The setup is very simple and it works
--- begin forwarded text
Date: Wed, 14 Feb 2001 09:52:21 +
To: [EMAIL PROTECTED], [EMAIL PROTECTED]
From: "R. A. Hettinga" [EMAIL PROTECTED]
Subject: DCSB: Steven Levy; How the Crypto Rebels Won
Cc: Steven Levy [EMAIL PROTECTED], Scott Moskowitz [EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]
It is secure to make a onetime pad using 16 bit input from soundcard using the
following algorithm?
Each bit of the output is the result of XOR-ing all 16 bits from the input
sample... so, for making one byte of "one-time pad", I need 8 samples (16*8
bits or 16 bytes) of input?
Of course I
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Gee, is Tatu going to yell at them too?
(Refer to
http://slashdot.org/articles/01/02/14/1120247.shtml
if you don't know what I'm talking about.)
One would think that after several years of IETF work on standardizing
(that which is called SecSH
The 2001 RSA Security Conference will be April 8-12 in San Francisco.
http://www.rsasecurity.com/conference/
The Bay Area Cypherpunks monthly meeting is normally the second Saturday,
except when there are major conferences in town.
If you're visiting the area that week, are you likely to
Hello,
I had this question asked by a subscriber of Infosec News
http://www.c4i.org/isn.html After posting the near-FUD article on Bin
Laden's use of stegography and I was unable to answer it, Could
someone help me with this?
Thanks in advance!
William Knowles
Moderator/ISN
[EMAIL PROTECTED]
At 03:31 PM 2/14/01 +0200, Paul N wrote:
It is secure to make a onetime pad using 16 bit input from soundcard using
the
following algorithm?
Each bit of the output is the result of XOR-ing all 16 bits from the input
sample... so, for making one byte of "one-time pad", I need 8 samples (16*8
At 12:49 PM 2/17/01 -0600, William Knowles wrote:
Can you tell by statistical or other fiddling with a file whether it
has stuff embedded in it?
Not if the stats on the stegodata match the stats of the coverbits
they replaced.
1. Measure at the stats on the least significant bits from your