@stake wows the wireless rubes...

2002-03-20 Thread R. A. Hettinga
--- begin forwarded text Status: U Date: Wed, 13 Mar 2002 03:17:48 -0600 (CST) From: InfoSec News [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: [ISN] New Attack Intercepts Wireless Net Messages Sender: [EMAIL PROTECTED] Reply-To: InfoSec News [EMAIL PROTECTED]

NDS Denies Counterfeiting Charges By Canal Plus, Plans Countersuit

2002-03-20 Thread R. A. Hettinga
http://online.wsj.com/article_print/0,4287,SB101597625854059480,00.html March 13, 2002 EUROPEAN BUSINESS NEWS NDS Denies Counterfeiting Charges By Canal Plus, Plans Countersuit By BRUCE ORWALL Staff Reporter of THE WALL STREET JOURNAL WAR IN TV LAND Canal Plus Alleges NDS Helped Steal

[ISN] Cryptography: Its not just about keeping things secret

2002-03-20 Thread R. A. Hettinga
--- begin forwarded text Status: U Date: Thu, 14 Mar 2002 01:43:59 -0600 (CST) From: InfoSec News [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: [ISN] Cryptography: Its not just about keeping things secret Sender: [EMAIL PROTECTED] Reply-To: InfoSec News [EMAIL PROTECTED]

USENIX Smart Card Research and Advanced Application Conference

2002-03-20 Thread Jon Simon
This information is from http://www.usenix.org/events/cardis02/cfp/ and there is more info at that url. Fifth Smart Card Research and Advanced Application Conference November 20-22, 2002 Hyatt Ste. Claire, San Jose, California, USA Sponsors IFIP Working Group 8.8 (Smart Cards) USENIX, the

Attention PGP Customers, Important information concerning E-Business Server

2002-03-20 Thread R. A. Hettinga
--- begin forwarded text Status: U Date: Fri, 15 Mar 2002 08:02:49 -0800 From: Network Associates [EMAIL PROTECTED] Reply-To: Network Associates [EMAIL PROTECTED] Subject: Attention PGP Customers, Important information concerning E-Business Server To: [EMAIL PROTECTED]

Fwd: [BAWUG] AirTraq Mailing List announcement

2002-03-20 Thread R. A. Hettinga
--- begin forwarded text Status: U Date: Sat, 16 Mar 2002 17:14:27 + To: [EMAIL PROTECTED] From: Fearghas McKay [EMAIL PROTECTED] Subject: Fwd: [BAWUG] AirTraq Mailing List announcement Reply-To: Usual People List [EMAIL PROTECTED] Sender: [EMAIL PROTECTED] List-Subscribe: mailto:[EMAIL

Re: DNA-Based Computer Solves Truly Huge Logic Problem

2002-03-20 Thread R. A. Hettinga
--- begin forwarded text Status: U Date: Sat, 16 Mar 2002 14:16:31 -0800 To: [EMAIL PROTECTED] From: Bill Stewart [EMAIL PROTECTED] Subject: Re: DNA-Based Computer Solves Truly Huge Logic Problem Sender: [EMAIL PROTECTED] At 01:44 PM 03/15/2002 -0600, James Choate wrote:

Knuth on crypto...

2002-03-20 Thread R. A. Hettinga
--- begin forwarded text Status: U From: Nomen Nescio [EMAIL PROTECTED] Comments: This message did not originate from the Sender address above. It was remailed automatically by anonymizing remailer software. Please report problems or inappropriate use to the remailer administrator at

Omniscient Cryptanalysis... (was Re: Knuth needs killing)

2002-03-20 Thread R. A. Hettinga
...or, Newby's Rejoinder to Knuth's Paradox. This is just about the funniest thing I've read on cryptography in months. Maybe years. Outstanding. Laugh-out-loud funny. Somewhere, I bet even St. Anselm is laughing, and Bishop Berkeley is pouring himself a stiff one... Still grinning, RAH ---

[Mnet-devel] Experiences Deploying a Large Scale EmergentNetwork

2002-03-20 Thread R. A. Hettinga
--- begin forwarded text Status: U To: [EMAIL PROTECTED] From: Zooko [EMAIL PROTECTED] Reply-to: Zooko [EMAIL PROTECTED] Subject: [Mnet-devel] Experiences Deploying a Large Scale Emergent Network Sender: [EMAIL PROTECTED] List-Help: mailto:[EMAIL PROTECTED]?subject=help List-Post:

CeBIT: Federal German Ministry of Economics Forces E-mailEncryption

2002-03-20 Thread R. A. Hettinga
http://www.cebit.de/top-21508.html?druckeboot=1news_article_id=350archiv=1 CeBIT 2002 18.03.2002, © Deutsche Messe AG 2002 IT Newsticker 16.03.2002 11:49 CeBIT: Federal German Ministry of Economics Forces E-mail

Re: Secure peripheral cards

2002-03-20 Thread Sean Smith
Well, there's always the IBM 4758, which we built as a general-purpose secure computer environment for hostile environments, with the ability for on-device applications to prove to the outside world what they are and where they're running. IBM's been marketing it primarily as a crypto

Re: crypto question

2002-03-20 Thread Pat Farrell
At 01:45 PM 3/21/2002 +1100, McMeikan, Andrew wrote: Question. Is it possible to have code that contains a private encryption key safely? Every way I look at it the answer seems no, yet some degree of safety might be possible by splitting an encrypting routine across several nodes. Can someone

Re: crypto question

2002-03-20 Thread Mike Brodhead
The usual good solution is to make a human type in a secret. Of course, the downside is that the appropriate human must be present for the system to come up properly. In some situations, the system must be able to boot into a working state. That way, even if somebody accidentally trips the

Re: crypto question

2002-03-20 Thread dmolnar
On Thu, 21 Mar 2002, McMeikan, Andrew wrote: A question and a probe. Question. Is it possible to have code that contains a private encryption key safely? Every way I look at it the answer seems no, yet some degree of safety might be possible by splitting an encrypting routine across