On Wed, Nov 9, 2016 at 3:07 PM, Jaromil wrote:
>
> ...but ZCash feels a bit scammy. Its pumped up entry on the market
> burnt a lot of people's money... is it just their fault being stupid?
…
> Sincerely, I'm not trolling. Seeing there is some space for a civil
> conversation,
Hi folks!
I've been quiet on this list for a while now. I've been hard at work
on creating a Bitcoin-like cryptocurrency with zero-knowledge-based
crypto:
https://z.cash
This is the most sophisticated crypto that I've ever seen someone
attempt to deploy at scale to the Internet. (By all means
On Tue, Oct 20, 2015 at 8:00 AM, Joachim Strömbergson
wrote:
>
> Esp in embedded space, md5 is still very, very common even in new
> designs. And SHA-1 is the new black.
>
> A typical setup is that someone has found out that there is a secure
> hash function called md5
Dear Eugen:
There have been several experiments in this direction, using
memory-hard proofs-of-work. For example, this was the motivation for
Litecoin (https://en.wikipedia.org/wiki/Litecoin) to use scrypt in its
Proof-of-Work. To my knowledge, the state-of-the-art design is John
Tromp's Cuckoo
On Mon, Oct 28, 2013 at 6:49 AM, Richard Elling
richard.ell...@gmail.com wrote:
I hate to keep this thread going, but it cannot end with an open-ended
threat... please, let's kill it off nice and proper.
Hey, I don't want to waste anyone's time, including my own. If nobody
is interested in
On Tue, Oct 22, 2013 at 6:05 AM, Schlacta, Christ aarc...@aarcane.org wrote:
If any weakened algorithm is to be implemented, how can we know how weak is
too weak, and how strong is sufficient? Each professional Cryptographer has
given different opinions and all those at our immediate
Date: Tue, 1 Oct 2013 15:45:27 -0400
From: zooko zo...@zooko.com
To: Multiple recipients of list hash-fo...@nist.gov
Subject: Re: On 128-bit security
Folks:
Here are my personal opinions about these issues. I'm not expert at
cryptanalysis. Disclosure: I'm one of the authors of BLAKE2 (but not
Dear Jon:
Thank you for your kind words and your detailed response.
I am going to focus only on the issue that I think is most relevant
and urgent for your customers and mine.
That urgent issue is: what's the difference between the now-canceled
Silent Mail product and the products that you are
also posted here: https://leastauthority.com/blog/open_letter_silent_circle.html
This open letter is in response to the `recent shutdown of Lavabit`_ ,
the ensuing `shutdown of Silent Circle's “Silent Mail” product`_, `Jon
Callas's posts about the topic on G+`_, and `Phil Zimmermann's
interview
Dear people of the cryptography@randombit.net mailing list:
For obvious reasons, the time has come to push hard on *verifiable*
end-to-end encryption. Here's our first attempt. We intend to bring
more!
We welcome criticism, suggestions, and requests.
Regards,
Zooko Wilcox-O'Hearn
Founder,
On Tue, Aug 13, 2013 at 5:16 PM, Peter Saint-Andre stpe...@stpeter.im wrote:
On 8/13/13 11:02 AM, ianG wrote:
Super! I think a commercial operator is an essential step forward.
How so? Centralization via commercial operators doesn't seem to have helped
in the email space lately.
It helps
ANNOUNCING Tahoe, the Least-Authority File System, v1.10
The Tahoe-LAFS team is pleased to announce the immediate
availability of version 1.10.0 of Tahoe-LAFS, an extremely
reliable distributed storage system. Get it here:
https://tahoe-lafs.org/source/tahoe-lafs/trunk/docs/quickstart.rst
12 matches
Mail list logo