Hi Zooko,
On 30/08/13 01:26 AM, zooko wrote:
On Sat, Aug 24, 2013 at 09:18:33PM +0300, ianG wrote:
I'm not convinced that the US feds can at this stage order the
backdooring of software, carte blanche. Is there any evidence of
that?
(I suspect that all their powers in this area are from
On Fri, Aug 23, 2013 at 9:37 PM, coderman coder...@gmail.com wrote:
...
this is but a tame example of fiscal absurdity related to interception
infrastructure; it is big business and truth is stranger than fiction!
lawful intercept*, at any scale and jurisdiction, is a profit center.
for US
On Sat, Aug 24, 2013 at 09:18:33PM +0300, ianG wrote:
I'm not convinced that the US feds can at this stage order the
backdooring of software, carte blanche. Is there any evidence of
that?
(I suspect that all their powers in this area are from pressure and
horse trading. E.g., the
Hey Z,
On 23/08/13 18:21 PM, Zooko Wilcox-OHearn wrote:
Dear Jon:
Thank you for your kind words and your detailed response.
I am going to focus only on the issue that I think is most relevant
and urgent for your customers and mine.
That urgent issue is: what's the difference between the
Dear Jon:
Thank you for your kind words and your detailed response.
I am going to focus only on the issue that I think is most relevant
and urgent for your customers and mine.
That urgent issue is: what's the difference between the now-canceled
Silent Mail product and the products that you are
On Aug 23, 2013, at 12:19 PM, Nicolas Rachinsky
crypto-ran...@ml.turing-complete.org wrote:
* Zooko Wilcox-OHearn zo...@leastauthority.com [2013-08-23 15:21 +]:
But before we get into the nuts and bolts of how to facilitate
verification of end-to-end security, I want to hammer on the
On 17 August 2013 13:50, Jon Callas j...@callas.org wrote:
...
I *cannot* provide an argument of security that can be verified on its
own. This is Godel's second incompleteness theorem. A set of statements S
cannot be proved consistent on its own. (Yes, that's a minor handwave.)
.
.
On Thu,
On 2013-08-17, at 1:50 PM, Jon Callas wrote:
On Aug 17, 2013, at 12:49 AM, Bryan Bishop kanz...@gmail.com wrote:
Would providing (signed) build vm images solve the problem of
distributing your toolchain?
Maybe. The obvious counterexample is a compiler that doesn't
deterministically
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Also at http://silentcircle.wordpress.com/2013/08/17/reply-to-zooko/
# Reply to Zooko
(My friend and colleague, [Zooko
Wilcox-O'Hearn](https://leastauthority.com/blog/author/zooko-wilcox-ohearn.html)
wrote an open letter to me and Phil [on his
On Sat, Aug 17, 2013 at 1:04 AM, Jon Callas j...@callas.org wrote:
It's very hard, even with controlled releases, to get an exact
byte-for-byte recompile of an app. Some compilers make this impossible
because they randomize the branch prediction and other parts of code
generation. Even when
On Aug 17, 2013, at 12:49 AM, Bryan Bishop kanz...@gmail.com wrote:
On Sat, Aug 17, 2013 at 1:04 AM, Jon Callas j...@callas.org wrote:
It's very hard, even with controlled releases, to get an exact byte-for-byte
recompile of an app. Some compilers make this impossible because they
On 2013-08-17 4:04 PM, Jon Callas wrote:
The problems run even deeper than the raw practicality. Twenty-nine years ago this month, in the August 1984
issue of Communications of the ACM (Vol. 27, No. 8) Ken Thompson's famous Turing Award lecture,
Reflections on Trusting Trust was published. You
On Sat, Aug 17, 2013 at 12:50 PM, Jon Callas j...@callas.org wrote:
On Aug 17, 2013, at 12:49 AM, Bryan Bishop kanz...@gmail.com wrote:
Would providing (signed) build vm images solve the problem of distributing
your toolchain?
A more interesting approach would be to use a variety of
On Sat, Aug 17, 2013 at 3:49 AM, Bryan Bishop kanz...@gmail.com wrote:
On Sat, Aug 17, 2013 at 1:04 AM, Jon Callas j...@callas.org wrote:
It's very hard, even with controlled releases, to get an exact
byte-for-byte recompile of an app. Some compilers make this impossible
because they
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Aug 17, 2013, at 11:00 AM, Ali-Reza Anghaie a...@packetknife.com wrote:
On Sat, Aug 17, 2013 at 1:50 PM, Jon Callas j...@callas.org wrote:
I hope I don't sound like a broken record, but a smart attacker isn't going
to attack there, anyway. A
15 matches
Mail list logo