[cryptography] Finally! Hyperledger is a trust N out of a selected M ledger system!

2014-07-10 Thread Lodewijk andré de la porte
http://hyperledger.com/ With this nifty little tool one can manage pools that validate transactions. So instead of a consortium of anonymous miners motivated exclusively by profit you can trust a consortium selected according to a predefined procedure. Then if you trust the procedure, you can

[cryptography] Silent Circle Takes on Phones, Skype, Telecoms

2014-07-10 Thread John Young
https://blog.silentcircle.com/why-are-we-competing-with-phone-makers-skype-and-telecom-carriers-all-in-the-same-week/ ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography

Re: [cryptography] Silent Circle Takes on Phones, Skype, Telecoms

2014-07-10 Thread Kevin
On 7/10/2014 4:39 PM, John Young wrote: https://blog.silentcircle.com/why-are-we-competing-with-phone-makers-skype-and-telecom-carriers-all-in-the-same-week/ ___ cryptography mailing list cryptography@randombit.net

Re: [cryptography] Silent Circle Takes on Phones, Skype, Telecoms

2014-07-10 Thread John Young
This is the comsec dilemma. If a product or system becomes mainstream it is more likely to be overtly and/or covertly compromised. If marginal it is likely to be used by few and consequently not well tested against overt and/or covert faults and compromise, may go out of of business, or aquired

Re: [cryptography] Silent Circle Takes on Phones, Skype, Telecoms

2014-07-10 Thread Eirik
On 10 July 2014 22:39:01 CEST, John Young j...@pipeline.com wrote: https://blog.silentcircle.com/why-are-we-competing-with-phone-makers-skype-and-telecom-carriers-all-in-the-same-week/ I think a lot of the stuff Silent Circle is doing looks great; but I think we need a real open OS (perhaps

Re: [cryptography] Silent Circle Takes on Phones, Skype, Telecoms

2014-07-10 Thread Tony Arcieri
On Thu, Jul 10, 2014 at 4:45 PM, John Young j...@pipeline.com wrote: This is the comsec dilemma. If a product or system becomes mainstream it is more likely to be overtly and/or covertly compromised. This is why it's important the client is open source, the binaries are reproducible, and the

Re: [cryptography] Silent Circle Takes on Phones, Skype, Telecoms

2014-07-10 Thread shawn wilson
On Thu, Jul 10, 2014 at 10:52 PM, Tony Arcieri basc...@gmail.com wrote: On Thu, Jul 10, 2014 at 4:45 PM, John Young j...@pipeline.com wrote: This is the comsec dilemma. If a product or system becomes mainstream it is more likely to be overtly and/or covertly compromised. I don't find this a