Not exactly related to Malicious Hardware/Software discussion, but
interesting nonetheless:
http://blog.wired.com/defense/2008/04/the-case-of-the.html
http://spectrum.ieee.org/may08/6171
saqib
http://doctrina.wordpress.com/
-
File under security humour:
http://thedailywtf.com/Articles/The-Super-Hacker.aspx
Peter.
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
On Apr 24, 2008, at 7:58 PM, Jacob Appelbaum wrote:
If we could convince (this is the hard part) companies to publish what
they think their chips should look like, we'd have a starting point.
I would think that it also helps if a company publishes the source
code and complete verification
It's fashionable in some circles (including, it seems, this one) to bash
IPsec (particularly IKE) and tout SSL VPNs (particularly OpenVPN) on what
are basically user interface grounds.
I cannot help repeatedly noting that -- I believe more so than with actual
IPsec deployments, whether with or
My understanding, based mostly on what I've read in the press, is that
COFFEE is a set of scripts that run existing tools, making it easier
for law enforcement to do things which are already known to be
possible. Note the words executing 150 seperate commands, which, I
think, would be odd if this