On the rijndael page I see this note below the optimized code link :
IMPORTANT NOTE ! This code was written in order to clarify the
mathematical description, and to run the statistical test. Without
modification, it should not
be used to encrypt files, or for any other application.
What exactly
Jim Choate wrote :
On Tue, 5 Dec 2000, John Young wrote:
But that is trivial compared to your claim that you decide what is
evidence
and that it then becomes illegal to alter or destroy it. That appears
to be
playing cop without the authority.
No John, that is not my claim. You wish it were
I've got sources kicking around somewhere that do this with noise
patterns in monochrome bitmaps. I'm not sure if the effect using ascii
is achieved in the exact same way - no doubt it is very closely related
but not as dense as the bitmaps.
Mike
Well, not crypto but stego.
I was looking for
Bush Calls Administration Encryption Policy "Outdated"
Responding to a question about encryption technology in an
ongoing
Internet debate, Texas Gov. George W. Bush castigated President
Clinton
and Vice President Gore for what he called "outdated" technology
policy.
"The Clinton
Wouldn't the time of the hack be pretty well known and wouldn't the RPI
firewall logs be timestamped or am I naive?
Is knowledge being used as evidence of guilt?
Mike
Andres Salomon, a fairly clued in RPI student, heard on
IRC that the Yankees website had been hacked. He
checked it out,
Amusing.
Here is my last post in this thread, because I feel that it is going
nowhere:
Isn't that a CP thread hallmark? Is this a preview of item 2) ?
My views are irreconcilable with those of the libertarians on this
list. Here's the way I view the world:
1) Life has no inherent