--- begin forwarded text
Status: U
Date: Wed, 13 Mar 2002 03:17:48 -0600 (CST)
From: InfoSec News [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [ISN] New Attack Intercepts Wireless Net Messages
Sender: [EMAIL PROTECTED]
Reply-To: InfoSec News [EMAIL PROTECTED]
http://online.wsj.com/article_print/0,4287,SB101597625854059480,00.html
March 13, 2002
EUROPEAN BUSINESS NEWS
NDS Denies Counterfeiting Charges
By Canal Plus, Plans Countersuit
By BRUCE ORWALL
Staff Reporter of THE WALL STREET JOURNAL
WAR IN TV LAND
Canal Plus Alleges NDS Helped Steal
--- begin forwarded text
Status: U
Date: Thu, 14 Mar 2002 01:43:59 -0600 (CST)
From: InfoSec News [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [ISN] Cryptography: Its not just about keeping things secret
Sender: [EMAIL PROTECTED]
Reply-To: InfoSec News [EMAIL PROTECTED]
This information is from http://www.usenix.org/events/cardis02/cfp/
and there is more info at that url.
Fifth Smart Card Research and Advanced Application Conference
November 20-22, 2002
Hyatt Ste. Claire, San Jose, California, USA
Sponsors
IFIP Working Group 8.8 (Smart Cards)
USENIX, the
--- begin forwarded text
Status: U
Date: Fri, 15 Mar 2002 08:02:49 -0800
From: Network Associates [EMAIL PROTECTED]
Reply-To: Network Associates [EMAIL PROTECTED]
Subject: Attention PGP Customers, Important information concerning
E-Business Server
To: [EMAIL PROTECTED]
--- begin forwarded text
Status: U
Date: Sat, 16 Mar 2002 17:14:27 +
To: [EMAIL PROTECTED]
From: Fearghas McKay [EMAIL PROTECTED]
Subject: Fwd: [BAWUG] AirTraq Mailing List announcement
Reply-To: Usual People List [EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]
List-Subscribe: mailto:[EMAIL
--- begin forwarded text
Status: U
Date: Sat, 16 Mar 2002 14:16:31 -0800
To: [EMAIL PROTECTED]
From: Bill Stewart [EMAIL PROTECTED]
Subject: Re: DNA-Based Computer Solves Truly Huge Logic Problem
Sender: [EMAIL PROTECTED]
At 01:44 PM 03/15/2002 -0600, James Choate wrote:
--- begin forwarded text
Status: U
From: Nomen Nescio [EMAIL PROTECTED]
Comments: This message did not originate from the Sender address above.
It was remailed automatically by anonymizing remailer software. Please
report problems or inappropriate use to the remailer administrator at
...or, Newby's Rejoinder to Knuth's Paradox.
This is just about the funniest thing I've read on cryptography in months.
Maybe years.
Outstanding. Laugh-out-loud funny.
Somewhere, I bet even St. Anselm is laughing, and Bishop Berkeley is
pouring himself a stiff one...
Still grinning,
RAH
---
--- begin forwarded text
Status: U
To: [EMAIL PROTECTED]
From: Zooko [EMAIL PROTECTED]
Reply-to: Zooko [EMAIL PROTECTED]
Subject: [Mnet-devel] Experiences Deploying a Large Scale Emergent Network
Sender: [EMAIL PROTECTED]
List-Help: mailto:[EMAIL PROTECTED]?subject=help
List-Post:
http://www.cebit.de/top-21508.html?druckeboot=1news_article_id=350archiv=1
CeBIT 2002 18.03.2002, © Deutsche Messe AG 2002
IT Newsticker
16.03.2002 11:49
CeBIT: Federal German Ministry of Economics Forces E-mail
Well, there's always the IBM 4758, which we built as a general-purpose
secure computer environment for hostile environments, with the ability
for on-device applications to prove to the outside world what they are
and where they're running.
IBM's been marketing it primarily as a crypto
At 01:45 PM 3/21/2002 +1100, McMeikan, Andrew wrote:
Question. Is it possible to have code that contains a private encryption
key safely? Every way I look at it the answer seems no, yet some degree of
safety might be possible by splitting an encrypting routine across several
nodes. Can someone
The usual good solution is to make a human type in a secret.
Of course, the downside is that the appropriate human must be present
for the system to come up properly.
In some situations, the system must be able to boot into a working
state. That way, even if somebody accidentally trips the
On Thu, 21 Mar 2002, McMeikan, Andrew wrote:
A question and a probe.
Question. Is it possible to have code that contains a private encryption
key safely? Every way I look at it the answer seems no, yet some degree of
safety might be possible by splitting an encrypting routine across
15 matches
Mail list logo