On Fri, 2 May 2008 08:33:19 +0100
Arcane Jill [EMAIL PROTECTED] wrote:
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Ryan Phillips
Sent: 28 April 2008 23:13
To: Cryptography
Subject: SSL and Malicious Hardware/Software
I can't think of a great
This is fairly interesting: AFAIK the first generalization of
predicate encryption to support disjunctions. I find the result mostly
interesting mathematically, since I expect we won't be seeing
predicate encryption in widespread use anytime soon due to complexity
and regulatory concerns.
Thor Lancelot Simon [EMAIL PROTECTED] writes:
The upshot is that, indeed, at least as shown here, this particular
configuration frontend to OpenVPN is very easy to configure -- if you are
willing to settle for much less security than OpenVPN was designed to
provide,
I think you mean:
]... if
On Saturday 03 May 2008 14:00, Perry E. Metzger wrote:
Right now, to use SSH to remotely connect to a machine using public
keys, all I have to do is type ssh-keygen and copy the locally
generated public key to a remote machine's authorized keys file.
When there is an IPSEC system that is
On Sat, 03 May 2008 17:00:48 -0400
Perry E. Metzger [EMAIL PROTECTED] wrote:
[EMAIL PROTECTED] (Peter Gutmann) writes:
I am left with the strong suspicion that SSL VPNs are easier to
configure and use because a large percentage of their user
population simply is not very sensitive to how