On Sun, 10 Dec 2000, FRANKY wrote:
to cryptography". However I would like to know where could I find more
books related to cryptography.
amazon.com is one place. see also
http://www.cacr.math.uwaterloo.ca/hac/
for an online copy of the Handbook of Applied Cryptography.
secure one system
On Tue, 24 Oct 2000, petro wrote:
If this world *were* a computer generated construct, it would
explain a few things.
This is why the Gnostics had such a good run of it in the first century,
right? At least until they were wiped out...
-David
On Thu, 7 Sep 2000, Asymmetric wrote:
Mihailescu's methods for prime generation. (Mihailescu has a paper on
the subject aimed at implementors at
http://www.inf.ethz.ch/~mihailes/papers/primgen.ps )
Ah.. I have implemented a sieve of eros..whatever his name is.. ;) for
Erastothenes, I
On Tue, 5 Sep 2000, Gary Jeffers wrote:
then give his opinion as to wheather it was legal or not. If the lawyer
said that it was legal and gave his opinion in writing, then the
client could proceed without out worry. The lawyer's opinion would stop
any criminal prosecution.
Does this
mailing lists. I'm not
on any of those, but poking around the EFF and such places may get you
started.
-dmolnar
rers are supposed to follow them or face consequences. How
do these "best practices" come about, and is this model relevant to crypto
in general and anonymous systems in particular? or am I hopelessly
confused and should seek a law school course?
-dmolnar
I can reach the theory.lcs.mit.edu web page and the CIS group page just
fine. Are you referring to the remailer?
On Fri, 2 Jun 2000, Anonymous wrote:
Anyone know what's wrong with *.lcs.mit.edu?
Hi,
I came across the term "indeterministic cryptosystem" while
reading the paper "MIXes in Mobile Communications Systems : Location
Management with Privacy" by Federrath, Jerichow, and A. Pfitzmann.
http://www.semper.org/sirene/lit/abstr96.html#FeJP1_96
An "indeterministic cryptosystem" is
Hi,
A post on alt.privacy.anon-server dated Thursday claims that the "Frog"
anonymous remailer has been seized by French police.
For the last few months, "Frog" had been running a statistics service
similar to the one Raph Levien used to have at UC-Berkeley. The admin has
also had a fairly
The sci.crypt FAQ is a decent place to start.
http://www.faqs.org/faqs/cryptography-faq/part01/
Then take a look at the _Handbook of Applied Cryptography_ for an
excellent and precise technical overview.
http://cacr.math.uwaterloo.ca/hac/
Supplement with _Applied Cryptography_ to see what
On Mon, 17 Apr 2000 [EMAIL PROTECTED] wrote:
Some of these, such as template-less biometrics, are so new they are
little more than a theoretical sparkle in designers' imaginations, but
they are moving fast.
Any idea what is meant by a "template-less biometric?" In order to verify
a
On Mon, 17 Apr 2000 [EMAIL PROTECTED] wrote:
Any idea what is meant by a "template-less biometric?" In order to verify
a person's identity, the live scan data must be compared with something,
i.e., a template.
On actually reading the article, it seems clear (to me) that what is meant
is
Hi,
The recent article reminds me -- did anyone see Tomas Sander and
Matt Franklin's presentation at CFP on "Deniable Payments and
Electronic Campaign Finance"? What did you think?
http://www.cfp2000.org/papers/franklin.pdf
Their idea is to take the "mandated donor anonymity" proposed by
On Wed, 12 Apr 2000, Declan McCullagh wrote:
Simson is a smart fellow, and a friend. But he does believe in aggressive
federal regulation of private sector data collection practices.
Indeed. That is why I mentioned him in response to your note that data
collection is an area which seems
On Tue, 7 Mar 2000, Michael Motyka wrote:
you? Or have you always been a mindless, obedient twit? Is that what
Harvard is accepting for admission these days? If so, we're doomed. I
sure as hell won't send my kids there.
Would you believe I was being sarcastic? or would that simply
One law my group is interested in is curfews. I would like to hear about
your opinions, and if you have any information on this subject.
I found curfews to be an effective technique for reminding me that I was
under the supervision and control of the institution imposing the curfew.
On Sat, 4 Mar 2000, bram wrote:
I've written up a public key encryption algorithm I came up with and some
thoughts on it at
http://www.gawth.com/bram/essays/simple_public_key.html
Here's an idea I just had towards an attack on the system. I'm not
sure it goes all the way through. It
On Sun, 5 Mar 2000, reject wrote:
Obviously, assorted FedGoons(tm) dislike untraceable money. Nasty
terrorists, child pornographers, drug dealers, and other horsemen could
hide their "profits" then...
But is there a *legitimate* reason to have anti-money-laundering laws? I
can't
On Sat, 4 Mar 2000, Jim Choate wrote:
Anonymous mailer operaters can most definitely be considered to be 'doing
anything' if it is found they're in the loop of a criminal investigation.
Yes. This is why I think it is important that even the senders of
anonymous mail not be able to prove
First place to look might be www.zks.net -- a commercial anonymous TCP/IP
service. Then be sure to look at www.onion-router.net for comparison.
You may also want to check out the links at
http://www.cypherspace.org/links
and the mix anonymity project at
Hey,
I noticed this a few days ago :
Workshop on Design Issues in Anonymity and Unobservability
July 25-26, 2000
International Computer Science Institute (ICSI), Berkeley, California
http://www.icsi.berkeley.edu/~hannes/ws.html
Looks like a lot of fun.
Also at the same site is an
On 3 Mar 2000, Secret Squirrel wrote:
If all payments are for different amounts, then this would no longer
work, as a chain of $123.45 payments would be easy to track. It would
therefore be necessary for the system to use a single standard payment
size. If people wanted to pay more,
On Mon, 28 Feb 2000, David Honig wrote:
Yeah right, PGP infringed on all kinds of things...
See http://www.cypherspace.org/~adam/timeline/
I am not sure that PGP is comparable. PGP works as long as my
correspondents have a copy as well. Digital cash seems to require more
widespread
On 28 Feb 2000, lcs Mixmaster Remailer wrote:
Run an anonymous ecash server which does withdrawals and deposits into
the mint account, from behind Freedom.net.
The only problem is that Freedom does not yet support anonymous servers.
What we need is a way of supporting this.
Tell me
On Thu, 24 Feb 2000, Luke Kenneth Casson Leighton wrote:
or do you mean "we must grant you a license to this other patent we
used to implement something covered by a GPL patent" ? What if the
person implementing the GPL patent doesn't have the ability to license
that patent?
then
On Thu, 24 Feb 2000, Luke Kenneth Casson Leighton wrote:
A new law that requires that any implementation instance of something that
is covered in full or in part by a GPL Patent requires FULL disclosure of
all Intellectual Property used in the implementation. Design documents,
other
I am looking for (true) horror stories about banking corruption. Specific
examples of money laundering, private information improperly divulged,
young clerks blackmailed by means of their sexuality, dark family secrets,
addicted boards of directors, and other methods of subversion.
(why?)
27 matches
Mail list logo