James wrote:
Adam Back wrote:
Hal says:
http://www.finney.org/~hal/chcash1.html and
http://www.finney.org/~hal/chcash2.html
Wow look at the dates on those files -- Oct 93, and we still no
deployed ecash. You'd think there would be a market there for porn
sites alone
[Hey Hal, what happened to your Chaum's ecash description? Can't find
it to link to].
Anonymous wrote:
Ray wrote:
Even if she provides enough
tokens to completely populate the cut-and-choose protocol,
those tokens still have to have splits of valid identification
information for
Obfuscation writes:
Adam Back writes:
It's as strong as we could make it. Private interactive
communications are a hard problem. As Wei and I were discussing in
the "PipeNet protocol" thread in the last couple of weeks, there are 4
main properties you're trying to optimise o
[Sent this once from a dud address trying to work around a mail
problem -- apologies for duplicates]
cypherpunk agent X wrote:
Here we get to the meat of the issue... the
item that NAI tried to force down our throats...Corporate Key Escrow..
this time via key splitting... Shades of the NSA
Seems to me you can do better with a gaming server. If the gaming
server servers RNGs in a sequence such that each sample in the
sequence can be verified, they don't need to trust the server; or at
least there is an audit function.
Eg. say that the server publishes subsequent pre-images in a
HJ Keller writes:
On Fri, Aug 25, 2000 at 09:54:02PM -0400, Adam Back wrote:
You can see the effect if you do:
% od -x /dev/random
and hold down for example the control key, or any other key. You get
a continuous stream of output while you hold the key down. This
applies
Eric wrote:
Adam wrote:
There is for example code in PGP which looks at inter key press
timings, and constructs 1st and 2nd order differentials to try to
avoid stuck keys, people pressing the same key repeatedly etc.
There's also the code in the linux /dev/random implementation, which
We would like to encourage people who have written yarrow
implementations to participate in deriving test vectors.
By arriving at a standard set of test vectors, we can better assure
ourselves that implementations are consistent with the specification,
and iron out different interpretations
identities, with an entry in your .emacs file which
looks like this:
(set-variable 'mc-pgp-user-id "Adam Back [EMAIL PROTECTED]")
Mailcrypt-3.5 introduced pgp5 and gnuPG support. But they also
changed the variable name. So if kept your existing .emacs file, they
would silently ignore yo
So as the RSA patent is expiring, and the PGP folks are pissed at RSA
for various underhand legal shenanigans, can we expect a PGP version
with RSA on by default, perhaps released midnight 20 September as a
ceromonial event at the party?
What about a GnuPG version which includes RSA and IDEA,
Ben writes:
Imagine there is a blinding function b, and an unblinding function
b'. Alice sends Bob b(y). Bob produces z=f'(b(y)). Alice extracts x =
b'(z).
Has this been done for RSA etc?
Pass, but I can't see why anyone would, since f'() for RSA is thought to
not exist.
f' exists
Declan reports in his article that Carnivore is a "windows 2000
computer". Given the insecurity of windows, with or without source
sooner or later someone is going to figure out a virus which frags it.
Say like the email address overflow which hit outlook recently.
The payload could be
Tim writes:
Making the Cypherpunks list a Usenet group has been discussed many,
many times. In fact, search Usenet for "cypherpunks" and one should
find one or more newsgroups, ready for use. (IIRC, Adam Back created
several groups.)
Not me. I think it was Paul Bradley i
Patrick writes:
Of further interest is the fact that I cannot access the FBI website
at all from the ZKS system. I use US-based ZKS proxies, so in
effect the FBI is denying me, a U.S. taxpaying citizen, access to
the public FBI website (created with my money of course). [...] I
think
http://www.eskimo.com/~rowdenw/crypt/Mix/draft-moeller-v3-01.txt
Some comments on the proposed mixmaster 3 protocol (see above).
- Section 3.2 describes using Elgamal. Two problems with this 1) I'm
not sure Elgamal is a good idea. RSA patent expires RSN, probably
before mix3 is likely to get
So Napster (www.napster.com) has an architecture which includes a
central server architecture for searching, and connecting to the
network, has been legally forced to remove 100s of thousands of user
accounts [1]
So the is possible because a) the notion of an 'account' exists
(napster is an IRC
Stefan Brands writes:
... By the way, to forestall Clarice unblinding the cash received
from Dave and thus knowing the identity of the cash Alice gets,
here's one option:
Alice provides the appropriate keys in an envelope Clarice
encrypted to Dave, such that Dave encrypts the
Ch'i writes:
I've been intrigued with the idea of "stealth remailers", which
retrieve messages from news servers. In order to play with this
idea a little I've written a quick-and-dirty python script.
[...]
So the stealth remailer conceals from the attacker which entry point
the originator
Marcel Popescu [EMAIL PROTECTED] writes:
Actually it's more like the store owner logging your name when you come in
just to take a look at his price for beer (and he doesn't even have to ask
you, because his security system will just query your ID smartcard). And
while he's at it,
19 matches
Mail list logo