A german TV news magazine (ZDF spezial) just mentioned that
the terrorists prepared and coordinated
also by using the internet, but no details were told.
[Moderator: I've listened to virtually all the news conferences made
so far. The FBI has yet to make any such statement.
The only
Senator Hatch was interviewed by national media on Tuesday and stated that
the US government had voice intercepts of calls talking about success with
two targets. He was later criticized for talking about the intercepts.
Hm, criticized? Why not indicted?
(a) Whoever knowingly
If they only cover Windoze (which is likely) the result will be that
the criminal / paranoid / privacy freak / hacker community will just
plain migrate to another OS... Which would be good for the world,
don't you think?
When outlaws use Linux, Linux will be outlawed.
And I'm not being
As I never tire of saying, PKI is the ATM of security.
Meaning that has a certain niche relevance, but is claimed by
proponents to be the answer to every need, and is the current magic
word for shaking the money tree.
-
The
Is there even development on the PGP (product) line? AFAIK
they (NAI) have not release PGP 7.x in source form. Worse, there
are a couple of bugs I found in 6.5.8 when I was porting it
to Tru64, but who knows if anyone is listening over at NAI.
Years ago I bought a few copies of commercial
I think there must be some sort of steganography tools in the
Microsoft Office Suite. I say this because people often tell
me they are sending me a Word or Powerpoint file with important
information in it, but I've yet to discover any.
:-)
[Moderator's note: I
There are other problems with using IPsec for VoIP.. In many cases
you are sending a large number of rather small packets of data. In
this case, the extra overhead of ESP can potentially double the size
of your data.
HOW small? You'd already be adding IP+UDP+RTP headers (20 [or 40] +
8 +
Businesses today could
reasonably be content with their 1024-bit keys, and military institutions
and those paranoid enough to fear from them should have upgraded years ago.
To me, the big news in Lucky Green's announcement is not that he believes
that Bernstein's research is
scatter an input photon, but I'm sure you needn't lose 1/2 of them.
But I agree that the use of this device can be detected by the
communicating parties.
Matt Crawford
(former quantum mechanic
2) I can't prove that a standard hash function such as SHA1
generates all possible codes, but I consider it likely. It would
be quite shocking if a strong hash function such as SHA1 generated
fewer codes than a weak function such as H0.
I think you could do a probabilistic
The basic idea of using zero-knowledge proofs to create an
unlikable anonymous credentials system ...
[sic] !
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
There's an M-209 for sale on EBay:
http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItemitem=726499988
Interestingly enough, some people are blocked for legal reasons from
getting to it.
Even more interestingly, connecting from a Department of Energy
network IP address with a .gov domain
No, it doesn't. It doesn't take unlimited time for lottery-based
payment schemes to average out; finite time suffices to get the
schemes to average out to within any desired error ratio.
Strictly speaking, the average will come within your error tolerance
of the expected value *with
... We can ask what is the
probability of a collision between f and g, i.e. that there exists
some value, x, in S such that f(x) = g(x)?
But then you didn't answer your own question. You gave the expected
number of collisions, but not the probability that at least one
exists.
That
I must be out of touch - since when did
PGP key signing require a photo id?
It's rather efficient if you want to sign a large number of keys of
people you mostly do not know personally.
Assuming, of course, that the ID is of a sort for which you have an
is-a-forgery oracle.
Has anyone
http://www.freedom-to-tinker.com/archives/000336.html
Quoting:
Here is one example of the far-reaching harmful effects of
these bills. Both bills would flatly ban the possession, sale,
or use of technologies that conceal from a communication
service
16 matches
Mail list logo