http://www.idcorner.org/index.php?p=88
The Identity Corner
Stephan Brands
I am genuinely excited about this
development, if it can be taken as an indication that Microsoft is getting
serious about privacy by design for identity management. That is a big
if, however: indeed, the same Microsoft
Anonymous wrote:
DTV Content Protection
[...] Similar concepts are presented in
http://apache.dataloss.nl/~fred/www.nunce.org/hdcp/hdcp111901.htm by
Scott Crosby, Ian Goldberg, Robert Johnson, Dawn Song and David Wagner.
This paper assumes (unlike Irwin) that attackers have access to the
private
--
James A. Donald:
PKI was designed to defeat man in the middle attacks
based on network sniffing, or DNS hijacking, which
turned out to be less of a threat than expected.
However, the session fixation bugs
http://www.acros.si/papers/session_fixation.pdf make
https and PKI
http://www.nytimes.com/2005/05/21/politics/21terror.html?ei=5065en=5515a53963929748ex=1117339200partner=MYWAYpagewanted=print
The New York Times
May 21, 2005
Plan to Let F.B.I. Track Mail in Terrorism Inquiries
By ERIC LICHTBLAU
WASHINGTON, May 20 - The F.B.I. would gain broad authority to
--
On 30 Mar 2005 at 13:00, Amir Herzberg wrote:
A missing element is motivation for getting something
like this deployed... I think spam could offer such
motivation; and, I strongly believe that a
cryptographic protocol to penalize spammers could be
one of the most important tools