Will A. Rodger [EMAIL PROTECTED] writes:
That would be a wise move. That would continue for about three weeks, and
then we'd see a bill out of Congress demanding that ISPs retain identity
for, oh, maybe seven years?
The population can be rather easily bought to do this, coercion
won't
Steve,
Not arguing, but the hardware cost curve for storage has a shorter
halving time than the cost curve for CPU (Moore's Law) and the
corresponding halving time for bandwidth is shorter still.
If that relationship holds up over a period of years, today's
tradeoffs between cache,
The union of the two sets of cryptography users and paranoid
people is necessarily non-empty. Who would bother to use
cryptography sans a threat model? And if you've got a non-empty
threat model, then by definition you're paranoid.
Uh, I don't have to run faster than the bear I
http://www.treas.gov/fincen/po1044.htm
For what it is worth, the apparent consensus view amongst U.S.
financial institutions is that if T+1 clearence and straight
through processing (STP) are to become operational realities,
then authentication and authorization credentials must be ones
I predict a new EMP vandalism tool that fries the moneychip.
And provides an alibi to passers of notes with no working chip.
You are, of course, assuming that RFID money that has been
damaged will still be accepted without manual processing
delays to the putative depositor. I can, after
|At 07:59 PM 1/26/2002 -0500, Scott Guthery wrote:
|(A test GSM authentication algorithm, COMP128, was attacked
|but it is not used in any large GSM networks. And it
|was the algorithm not the SIM that was attacked.)
|
|and at Sun, 27 Jan 2002 13:56:13 EST. Greg Rose
In the article they repeat the recommendation that you never
use/register the same shared-secret in different domains ... for
every environment you are involved with ... you have to choose a
different shared-secret. One of the issues of biometrics as a
shared-secret password
Folks, while we argue fine points we drift towards irrelevance
[1] National ID in Development (USA Today)
[2] Computer Security, Biometrics Dominate NIST Agenda (Washington Post)
--dan
[1]
National ID in Development
USA Today, 22 January 2002
Federal and state groups are moving to create
...
They begin with swashbuckling independence: new players spring up,
operating in a sort of new frontier, unconstrained by governments.
But, once a technology acquires commercial importance, rules and
standards emerge. Why? Because, argues Ms Spar, the industry's most
I download all of alt.anonymous.messages from the same news
server that large numbers of people post and download child
porn on.
It might be that child porn posted to these lists is the most
attractive vehicle as it is illegal everywhere, it will not be
downloaded at random, those who do
Or in other words, the first requirement for perimeter security is
a perimeter.
Wireless networks have no interior. Merging them with a
perimeter-protected network will yield a network with
the character of the wireless net. This is at once the
the beauty of community nets and the end
Content control is a dead end.
Folks,
You only get an even number of {privacy, copyright} -- either the
owner of information controls how it is used or he does not. Either
you embrace copyright-and-privacy, or you embrace neither.
It really is time to be careful what you ask for.
--dan
12 matches
Mail list logo