potential solutions to this.
--
- Adam
-
Adam Fields, Managing Partner, [EMAIL PROTECTED]
Surgam, Inc. is a technology consulting firm with strong background in
delivering scalable and robust enterprise web and IT applications.
http://www.adamfields.com
on the shuttle are obsolete by modern standards, and it's
possible that the communications security is similarly aged.
Isn't it also possible that the device contains a physical key of some
kind?
--
- Adam
-
Adam Fields, Managing Partner, [EMAIL PROTECTED]
Surgam
Thor Lancelot Simon says:
Many operating systems use Linux-style (environmental noise
stirred with a hash function) generators to provide random
and pseudorandom data on /dev/random and /dev/urandom
respectively. A few modify the general Linux design by adding an
output buffer which is not
Arnold G. Reinhold says:
This result would seem to raise questions about SHA1 and MD5 as much
as about the quality of /dev/random and /dev/urandom. Naively, it
should be difficult to create input to these hash functions that
cause their output to fail any statistical test.
I would think
I make my living as a technical consultant, doing architecture and
programming for mid-to-large-scale enterprise information processing
systems (mostly content management infrastructures lately). I have a
formal CS education, and I consider myself about as knowledgable an
amateur as possible on
[EMAIL PROTECTED] says:
I can just see it coming --
their email was in the clear and we still coudln't find them; imagine
how much harder it will be when everybody uses cryptography.
I don't think we can win either way.
Of course, when everybody uses state-sanctioned security, the