In article [EMAIL PROTECTED],
Michael Curry [EMAIL PROTECTED] wrote:
Neal included an interesting piece about his view of operating
systems).
Which is quite a nice piece. Also on the page is an excerpt from the book.
Ooohhh... I want more... :-)
I'll even ignore the technical errors (as
In article v04020adeb33016fecdf7@[139.167.130.249],
Robert Hettinga [EMAIL PROTECTED] wrote:
Do any of the ipsec folks out there have any idea whether the Palm III has
the oomph to do IPSEC?
The secret word is "proxy".
I'm thinking about that active badge stuff, where you beam yourself an
In article 001201bedc8b$3d5fb580$[EMAIL PROTECTED],
Enzo Michelangeli [EMAIL PROTECTED] wrote:
What's the point of using publick key technologies like ECC to protect
private documents? As key management is a non-issue, something based on,
say, 3DES or IDEA (like "Secret!",
In article [EMAIL PROTECTED],
Steven M. Bellovin [EMAIL PROTECTED] wrote:
For that matter, what is "export"? Posting something to Usenet?
Putting it up on a Web page or FTP server? The act of downloading it?
As far as I know, they haven't changed the definition of "export". Which
means this
In article [EMAIL PROTECTED],
Ron Rivest [EMAIL PROTECTED] wrote:
If no per-key approval is needed, then I don't see why one can't
distribute code that embodies a fixed transformation procedure, since
this is really a "key" rather than a "program". That is, the
distributed specifies a single
In article [EMAIL PROTECTED],
Matt Crawford [EMAIL PROTECTED] wrote:
The (now expired) RSA patent number, 4,405,829, is prime.
It would be interesting to suppose they finagled for that, but the
odds are a fairly decent 1-in-15 or so of it happening by chance.
It of course would have been more