On 2014-01-17 01:28, John Young wrote:
Civil engineers never say a dam is infallible, they say it will fail, watch
for well-known weak spots, prepare to patch and maintain continuously,
and never forget the disasters of over-confidence, limited construction
budgets, cut backs in maintenance, and
James, you protest too much, not that there's anything wrong with it.
There is much to be revealed about the indigination and outrage
racket driving security marketing flim-flam from natsec to comsec.
Tip:
Dig deeper into the origins of RSA, as in Addison Fischer (and business
partners), and
On Wed, Jan 15, 2014 at 5:38 PM, arne renkema-padmos
arne.renkema-pad...@cased.de wrote:
... Also, I
would like to have doctors fixing things like intestinal ruptures, not
some kid with their parent's sewing kit :P
i think you misunderstand some of my intent:
to be a competent developer, you
On 16/01/14 11:34, coderman wrote:
On Wed, Jan 15, 2014 at 5:38 PM, arne renkema-padmos
arne.renkema-pad...@cased.de wrote:
... Also, I
would like to have doctors fixing things like intestinal ruptures, not
some kid with their parent's sewing kit :P
i think you misunderstand some of my
With a $67B security market heading to $87B by 2016 why
would any security firm settle for RSA piddling racketerring?
http://www.nytimes.com/2014/01/15/technology/upstarts-challenge-old-timers-in-lucrative-computer-security-field.html
Not saying the RSA bashers are diverting attention from
On Wed, Jan 15, 2014 at 10:31 AM, John Young j...@pipeline.com wrote:
With a $67B security market heading to $87B by 2016 why
would any security firm settle for RSA piddling racketerring?
...
Not saying the RSA bashers are diverting attention from their
venality, that would be contrary to
On 16/01/14 01:08, coderman wrote:
information security as a discipline or specialization should not
exist. that systems, code, protocols, *, are built without security
priorities, and without end-user privacy and availability paramount,
is the dereliction of basic duty.
Not if the idea of
Shirley Jackson, The Lottery, sacrificing a victim purges guilt
of the guilty.
Does anyone really believe RSA is alone in this betrayal?
And that making an example of RSA will stop the industry practice
of forked-tonguedness about working both sides of the imaginary
fence of dual-use,
Well said. In perhaps-related ethics news:
RSA Conference is a separate entity from RSA, and (I believe) not a subsidiary
or profit center for either RSA or EMC. At this point, they're just unlucky
enough to have hitched their branding to the most recognized name in the
industry.
If it's
On Tue, Jan 14, 2014 at 8:34 AM, Jared Hunter feralch...@gmail.com wrote:
...
If it's wrong for RSA to take $10M to set a bad default in BSAFE, is it not
MORE wrong to sell the federal government a 0day for a fraction of that price?
collusion to weaken RNGs enables pervasive insecurity and
On Jan 14, 2014, at 1:53 PM, cryptography-requ...@randombit.net wrote:
Does anyone really believe RSA is alone in this betrayal?
And that making an example of RSA will stop the industry practice
of forked-tonguedness about working both sides of the imaginary
fence of dual-use, dual-hat,
If courageous, Rivest, Shamir and Adelson can be burnt in effigy.
Their initials once were rightly world famous, and to smear these
distinguished gentlemen by vulgar opportunistic protest instigated
by noobs with less than zero comprehension of cryptography
should be condemned not debated.
On 2014-01-15 02:12, John Young wrote:
Shirley Jackson, The Lottery, sacrificing a victim purges guilt
of the guilty.
Does anyone really believe RSA is alone in this betrayal?
And that making an example of RSA will stop the industry practice
of forked-tonguedness about working both sides of
On Tue, Jan 14, 2014 at 10:34 AM, Jared Hunter feralch...@gmail.com wrote:
RSA Conference is a separate entity from RSA, and (I believe) not a
subsidiary or profit center for either RSA or EMC. At this point, they're
just unlucky enough to have hitched their branding to the most recognized
But open source is compromised as well, for the same reasons
and by the same parties. Some claim open source was born of and
is powned by the spies. No problema, overcoming compromises
of parentage has forever been the fundamental, albeit futile,
crypto challenge.
Even precious OTP is
On 2014-01-15 10:48, John Young wrote:
But open source is compromised as well, for the same reasons
and by the same parties. Some claim open source was born of and
is powned by the spies.
We can audit open source. Of course that costs serious money, but some
people have adequate incentive to
16 matches
Mail list logo