[Moderator's note: I was under the impression most base stations did
the crypto in hardware, so the answer would be no, no performance
gain for such equipment. Besides, the main concern would be open
channels, not CPU load. Anyone know better? --Perry]
It's my understanding that functions like
Ted Tso writes:
It turns out that with the Intel 810 RNG, it's even worse because
there's no way to bypass the hardware whitening which the 810 chip
uses. Hence, if the 810 random number generator fails, and starts
sending something that's close to a pure 60 HZ sine wave to the
whitening
--- begin forwarded text
Status: U
From: Somebody
Date: Thu, 20 Sep 2001 08:53:52 +0100
Subject: New encryption technology closes WLAN security loopholes
TO: [EMAIL PROTECTED]
[1] New encryption technology closes WLAN security loopholes
Next Comm has launched new wireless LAN security
http://www.nytimes.com/2001/09/20/national/20SPY.html?todaysheadlines
September 20, 2001
THE ESPIONAGE BUSINESS
Surge of New Technologies Erodes U.S. Edge in Spying
By WILLIAM J. BROAD
or decades, the United States used its technical expertise to gather
electronic signals and eavesdrop
At 12:01 PM 9/16/01 -0400, Sandy Harris wrote:
Just taking a minute to plug http://munitions.vipul.net/
snip
A quick check of the site shows one mirror in Canada, the rest in
Europe. An Asian, Australian or Latin American mirror might be a good
idea. Volunteers?
Some Indian mirrors will be
--- begin forwarded text
Status: U
From: Julian Dibbell [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: nettime Pirate Utopia, FEED, February 20, 2001
Date: Thu, 20 Sep 2001 08:37:20 -0500
Sender: [EMAIL PROTECTED]
Reply-To: Julian Dibbell [EMAIL PROTECTED]
Key concepts: steganography,
Bill Frantz wrote:
At 2:17 PM -0700 9/19/01, Theodore Tso wrote:
It turns out that with the Intel 810 RNG, it's even worse because
there's no way to bypass the hardware whitening which the 810 chip
uses.
Does anyone know what algorithm the whitening uses?
Just like von Neumann's unbiasing
--- begin forwarded text
Status: U
From: Julian Dibbell [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: nettime Pirate Utopia, FEED, February 20, 2001
Date: Thu, 20 Sep 2001 08:37:20 -0500
Sender: [EMAIL PROTECTED]
Reply-To: Julian Dibbell [EMAIL PROTECTED]
Key concepts:
Also it's interesting to note that it appears from Niels Provos and
Peter Honeymans paper that none of the currently available stego
encoding programs are secure. They have broken them all (at least I
recognise the main stego programs available in their list of systems
their tools can attack),