As someone who spent 5 years doing all the physical security for a major
university I can say that ALL physical systems can be broken. No
exception. The three laws of thermodynamics apply to security systems as
well.
There is ALWAYS a hole.
On Thu, 21 Mar 2002, Arnold G. Reinhold wrote:
http://www.nytimes.com/2002/03/21/technology/circuits/21NEXT.html
...a new concrete that can conduct electricity may make it
possible to construct buildings in which the basic structure
does double duty as an electromagnetic shield.
cheers,
t
Submit your comments regarding the SSSCA here:
http://judiciary.senate.gov/special/input_form.cfm?comments=1
See below:
From: Peter D. Junger [EMAIL PROTECTED]
Subject: [DMCA_Discuss] Comments to the Senate Judiciary Committee
To: [EMAIL PROTECTED],
DVD Discussion List [EMAIL PROTECTED]
--- begin forwarded text
Status: U
Date: Fri, 22 Mar 2002 09:00:58 +
From: Nicko van Someren [EMAIL PROTECTED]
User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X; en-US; rv:0.9.4)
Gecko/20011126 Netscape6/6.2.1
To: R. A. Hettinga [EMAIL PROTECTED]
CC: Digital Bearer Settlement List
Just for your information: the German government manufactured
50,000 of those GnuPP CDs right from the start. Quite a number,
I think.
You can order a copy including a manual for free at their PR agency:
dmb agentur
Spitzweggasse 6
D-14482 Potsdam-Babelsberg
Germany
E-Mail: [EMAIL PROTECTED]
On Fri, Mar 22, 2002 at 03:39:01PM +1100, Greg Rose wrote:
But don't forget that your pentium can't do anything *else* while it's
doing those RSAs... whereas the machine with the nForce can be actually
servicing the requests.
While that is true, the issue is the economics; depending on the
--- begin forwarded text
Status: U
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: It's war, folks --- SSSCA formally introduced
Reply-to: [EMAIL PROTECTED]
Date: Thu, 21 Mar 2002 17:33:36 -0800
Sender: [EMAIL PROTECTED]
The story just hit Slashdot -- Senators Hollings, Stevens,
There are groups with lots of money and dedicated, trained agents who
are willing to die that would dearly like to steal a nuclear weapon.
So far, they have not succeeded (if they do, I fear we will know
about it quickly). So someone has been able to do physical security
right.
The problem
The problem is doing it in a way that is affordable and doesn't
require an army.
[snip]
I'm not sure what changes in your argument if you delete the word
physical. Perhaps we should all just give up with this security
nonsense.
:)
Agreed. It's not about perfect security, it's about
At 01:04 PM 3/21/02 -0500, Nelson Minar wrote:
Question. Is it possible to have code that contains a private encryption
key safely?
As a practical matter, yes and no. Practically no, because any way you
hide the encryption key could be reverse engineered. Practically yes,
because if you work at
From: R. Saravanan [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Date: Wed, 20 Mar 2002 12:50:51 -0700
Enigmail, a GnuPG plugin for Mozilla which has been under development
for some time, has now reached a state of practical usability with the
Mozilla 0.9.9 release. It allows you to send or
At 9:45 AM -0500 on 3/22/02, Roop Mukherjee wrote:
Wave.com touts this security system called Embassy.
By the way Wave has been around since the flood, and their primary MO has
always been exactly what Fritz Hollings, who Rush Limbaugh likes to imitate
with a Warner Brothers 'Foghorn Leghorn'
12 matches
Mail list logo