Mr AARG! writes...
Eric Murray writes:
Yes, the spec says that it can be turned off. At that point you
can run anything that doesn't need any of the protected data or
other TCPA services. But, why would a software vendor that wants
the protection that TCPA provides allow his software
On Mon, Jul 29, 2002 at 03:35:32PM -0700, AARG! Anonymous wrote:
Declan McCullagh writes at
http://zdnet.com.com/2100-1107-946890.html:
The world is moving toward closed digital rights management systems
where you may need approval to run programs, says David Wagner,
an assistant
[CSE = Canada's NSA. Supposedly legal under Patriot Act? --gnu]
http://cryptome.org/
Canadians Listen in on NSA's Behalf
A high-level U.S. intelligence source has revealed exclusively to
Intelligence Online that some of the communications surveillance
evidence used by the U.S. government to
David Wagner [EMAIL PROTECTED] writes:
I don't know of any good cryptographic hash function
that comes with a proof that all outputs are possible.
What about the scheme
Pad - Encipher - Contract
described at
http://www.monmouth.com/~jsd/turbid/paper/turbid.htm#sec-uniform-hash
John S. Denker [EMAIL PROTECTED] writes:
David Wagner [EMAIL PROTECTED] writes:
I don't know of any good cryptographic hash function
that comes with a proof that all outputs are possible.
What about the scheme
Pad - Encipher - Contract
described at
I meant to say, another example of a believed one-way function that is
guaranteed to be able to produce any output is one based on the
difficulty of discrete log:
f:(x) = g^x mod p
is bijective if the domain and range is 1..p-1, but finding preimages
is the discrete log problem. Of course this
On Thu, 1 Aug 2002 16:45:15 -0700, AARG!Anonymous [EMAIL PROTECTED]
wrote:
... snipt ...
Also, as stated earlier, data can be sealed such that it can only be
unsealed when the same environment is booted. This is the part above
about encrypting cryptographic keys and making sure the right
It occurs to me that the Palladium architecture relies on control
of the data paths between the memory and CPU.
In order to spoof it and read Palladium-protected content, all I
have to do is provide another path in and out of memory.
Dual-ported memory has been manufactured for video and DSP
http://www.forbes.com/newswire/2002/08/02/rtr684925.html
Internet security firm pulls planned IPO
Reuters, 08.02.02, 8:52 AM ET
MONTREAL, August 2 (Reuters) - Zero-Knowledge Systems Inc. pulled the plug
on Friday on a planned initial public offering, saying it will instead use
a recently
Jon Callas[SMTP:[EMAIL PROTECTED]]
On 8/1/02 1:14 PM, Trei, Peter [EMAIL PROTECTED] wrote:
So my question is: What is your reason for shielding your identity?
You do so at the cost of people assuming the worst about your
motives.
Is this a tacit way to suggest that the only
--
On 2 Aug 2002 at 10:43, Trei, Peter wrote:
Since the position argued involves nothing which would invoke
the malign interest of government powers or corporate legal
departments, it's not that. I can only think of two reasons why
our corrospondent may have decided to go undercover...
I
--- begin forwarded text
Status: RO
Subject: STOS Conference, Monterey 8/26 - 30
From: Ron Dumont [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]
Date: Fri, 2 Aug 2002 10:24:41 -0700
[STOS] - The Secure Trusted Operating System Consortium is pleased to
announce the:
1st
Jon Callas wrote:
On 8/1/02 1:14 PM, Trei, Peter [EMAIL PROTECTED] wrote:
So my question is: What is your reason for shielding your identity?
You do so at the cost of people assuming the worst about your
motives.
Is this a tacit way to suggest that the only people who need anonymity or
On Fri, 2 Aug 2002, James A. Donald wrote:
--
On 2 Aug 2002 at 10:43, Trei, Peter wrote:
Since the position argued involves nothing which would invoke
the malign interest of government powers or corporate legal
departments, it's not that. I can only think of two reasons why
our
AARG! Anonymous[SMTP:[EMAIL PROTECTED]] writes
[...]
Now, there is an optional function which does use the manufacturer's key,
but it is intended only to be used rarely. That is for when you need to
transfer your sealed data from one machine to another (either because you
have
--
On 2 Aug 2002 at 14:36, Trei, Peter wrote:
OK, It's 2004, I'm an IT Admin,
and I've converted my corporation over to TCPA/Palladium machines. My
Head of Marketing has his TCPA/Palladium desktop's hard drive
jam-packed with corporate confidential documents he's been actively
working on
Peter Trei writes:
It's rare enough that when a new anononym appears, we know
that the poster made a considered decision to be anonymous.
The current poster seems to have parachuted in from nowhere,
to argue a specific position on a single topic. It's therefore
reasonable to infer that
Peter Trei envisions data recovery in a TCPA world:
HoM: I want to recover my data.
Me: OK: We'll pull the HD, and get the data off it.
HoM: Good - mount it as a secondary HD in my new system.
Me: That isn't going to work now we have TCPA and Palladium.
HoM: Well, what do you have to
18 matches
Mail list logo