Gil Hamilton wrote:
I've never heard it disclosed how the prosecutor discovered that Miller had
had such a conversation but it isn't relevant anyway. The question is, can
she defy a subpoena based on membership in the privileged Reporter class that
an ordinary person could not defy?
Why not?
Gil Hamilton wrote:
The problem is that reporters want to be made into a special class of
people that don't have to abide by the same laws as the rest of us. Are
you a reporter? Am I? Is the National Inquirer? How about Drudge?
What about bloggers? Which agency will you have to apply to
Gil Hamilton wrote:
I've never heard it disclosed how the prosecutor discovered that Miller had
had such a conversation but it isn't relevant anyway. The question is, can
she defy a subpoena based on membership in the privileged Reporter class that
an ordinary person could not defy?
Why not?
Gil Hamilton wrote:
The problem is that reporters want to be made into a special class of
people that don't have to abide by the same laws as the rest of us. Are
you a reporter? Am I? Is the National Inquirer? How about Drudge?
What about bloggers? Which agency will you have to apply to
Tyler Durden wrote:
We need a WiFi VoIP over Tor app pronto! Let 'em CALEA -that-. Only then
will the ghost of Tim May rest in piece.
Don't really need one. the Skype concept of supernodes - users that relay
conversations for other users - could be used just as simply, and is
Tyler Durden wrote:
We need a WiFi VoIP over Tor app pronto! Let 'em CALEA -that-. Only then
will the ghost of Tim May rest in piece.
Don't really need one. the Skype concept of supernodes - users that relay
conversations for other users - could be used just as simply, and is
Hasan Diwan wrote:
if the US wants to maintain its fantasy, it will need a Ministry of Truth to
do so. Cheers, Hasan Diwan [EMAIL PROTECTED]
And the airing of government-issued news bulletins without attributation (or
indeed, anything from Fox News) doesn't convince you there already is one?
Tyler Durden wrote:
Hey...this looks interesting. I'd like to see the email chain before this.
sorry, accidental crosspost from mailto:cryptography@metzdowd.com; see
http://diswww.mit.edu/bloom-picayune/crypto/18225 for the post it is a reply to.
Hasan Diwan wrote:
if the US wants to maintain its fantasy, it will need a Ministry of Truth to
do so. Cheers, Hasan Diwan [EMAIL PROTECTED]
And the airing of government-issued news bulletins without attributation (or
indeed, anything from Fox News) doesn't convince you there already is one?
Tyler Durden wrote:
Hey...this looks interesting. I'd like to see the email chain before this.
sorry, accidental crosspost from mailto:cryptography@metzdowd.com; see
http://diswww.mit.edu/bloom-picayune/crypto/18225 for the post it is a reply to.
Eugen Leitl wrote:
http://wired.com/news/print/0,1294,68306,00.html
Privacy Guru Locks Down VOIP
By Kim Zetter
Story location: http://www.wired.com/news/technology/0,1282,68306,00.html
10:20 AM Jul. 26, 2005 PT
First there was PGP e-mail. Then there was PGPfone for modems. Now Phil
Eugen Leitl wrote:
http://wired.com/news/print/0,1294,68306,00.html
Privacy Guru Locks Down VOIP
By Kim Zetter
Story location: http://www.wired.com/news/technology/0,1282,68306,00.html
10:20 AM Jul. 26, 2005 PT
First there was PGP e-mail. Then there was PGPfone for modems. Now Phil
Joseph Ashwood wrote:
I believe you substantially misunderstood my statements, 2^69 work is
doable _now_. 2^55 work was performed in 72 hours in 1998, scaling
forward the 7 years to the present (and hence through known data) leads
to a situation where the 2^69 work is achievable today in a
Eugen Leitl wrote:
On Sat, Feb 19, 2005 at 03:53:53PM +, Dave Howe wrote:
I wasn't aware that FPGA technology had improved that much if any - feel
free to correct my misapprehension in that area though :)
FPGAs are too slow (and too expensive), if you want lots of SHA-1
performance,
use
Joseph Ashwood wrote:
I believe you substantially misunderstood my statements, 2^69 work is
doable _now_. 2^55 work was performed in 72 hours in 1998, scaling
forward the 7 years to the present (and hence through known data) leads
to a situation where the 2^69 work is achievable today in a
Eugen Leitl wrote:
On Sat, Feb 19, 2005 at 03:53:53PM +, Dave Howe wrote:
I wasn't aware that FPGA technology had improved that much if any - feel
free to correct my misapprehension in that area though :)
FPGAs are too slow (and too expensive), if you want lots of SHA-1
performance,
use
Joseph Ashwood wrote:
I believe you are incorrect in this statement. It is a matter of public
record that RSA Security's DES Challenge II was broken in 72 hours by
$250,000 worth of semi-custom machine, for the sake of solidity let's
assume they used 2^55 work to break it. Now moving to a
Joseph Ashwood wrote:
I believe you are incorrect in this statement. It is a matter of public
record that RSA Security's DES Challenge II was broken in 72 hours by
$250,000 worth of semi-custom machine, for the sake of solidity let's
assume they used 2^55 work to break it. Now moving to a
Roy M. Silvernail wrote:
I'd thought it was so Microsoft could offer an emulation-based migration
path to all the apps that would be broken by Longhorn. MS has since
backed off on the new filesystem proposal that would have been the
biggest source of breakage (if rumors of a single-rooted, more
[EMAIL PROTECTED] wrote:
This is what I love about the Internet -- ask a question
and get silence but make a false claim and you get all the
advice you can possibly eat.
Yup. give wrong advice, and you look like a fool. correct someone
else's wrong advice, and you make them look foolish (unless
Ian Grigg wrote:
It's actually quite an amusing problem. When put
in those terms, it might be cheaper and more secure
to go find some druggie down back of central station,
and pay them a tenner to write out the ransom demand.
Or buy a newspaper and start cutting and pasting the
letters...
or
Roy M. Silvernail wrote:
I was thinking more of the rumor that Longhorn's filesystem would
start at '/', removing the 'X:' and the concept of separate drives
(like unix has done for decades :) ). When I first saw this
discussed, the consensus was that it would break any application that
expected
Ian Grigg wrote:
It's actually quite an amusing problem. When put
in those terms, it might be cheaper and more secure
to go find some druggie down back of central station,
and pay them a tenner to write out the ransom demand.
Or buy a newspaper and start cutting and pasting the
letters...
or
Roy M. Silvernail wrote:
I'd thought it was so Microsoft could offer an emulation-based migration
path to all the apps that would be broken by Longhorn. MS has since
backed off on the new filesystem proposal that would have been the
biggest source of breakage (if rumors of a single-rooted, more
[EMAIL PROTECTED] wrote:
This is what I love about the Internet -- ask a question
and get silence but make a false claim and you get all the
advice you can possibly eat.
Yup. give wrong advice, and you look like a fool. correct someone
else's wrong advice, and you make them look foolish (unless
Roy M. Silvernail wrote:
I was thinking more of the rumor that Longhorn's filesystem would
start at '/', removing the 'X:' and the concept of separate drives
(like unix has done for decades :) ). When I first saw this
discussed, the consensus was that it would break any application that
expected
Tyler Durden wrote:
I'm sure there are several Cypherpunks who would be very quick to
describe Kerry as needs killing.
but presumably, lower down the list than shrub and his current advisors?
R.A. Hettinga wrote:
The stored software will serve as a comparison tool for election officials
should they need to determine whether anyone tampered with programs
installed on voting equipment.
IIRC during the last set, the manufacturers themselves updated
freshly-minted software from their ftp
Tyler Durden wrote:
Yet what of your blindness, which doubts *everything* the current
administration does?
1. Abu Ghraib
2. WMD in Iraq
3. Patriot Act
4. Countless ties between this administration and the major contract
winners in Iraq
Hum. Seems a decent amount of doubt is called for.
For that
R.A. Hettinga wrote:
The stored software will serve as a comparison tool for election officials
should they need to determine whether anyone tampered with programs
installed on voting equipment.
IIRC during the last set, the manufacturers themselves updated
freshly-minted software from their ftp
Tyler Durden wrote:
I'm sure there are several Cypherpunks who would be very quick to
describe Kerry as needs killing.
but presumably, lower down the list than shrub and his current advisors?
Tyler Durden wrote:
Yet what of your blindness, which doubts *everything* the current
administration does?
1. Abu Ghraib
2. WMD in Iraq
3. Patriot Act
4. Countless ties between this administration and the major contract
winners in Iraq
Hum. Seems a decent amount of doubt is called for.
For that
Adam wrote:
You know, the more I read posts by Mr. Donald, the more I believe that
he is quite possibly the most apt troll I have ever encountered. It is
quite apparent from reading his responses that he is obviously an
exceptionally intelligent (academically anyway) individual. I find it
hard to
Adam wrote:
You know, the more I read posts by Mr. Donald, the more I believe that
he is quite possibly the most apt troll I have ever encountered. It is
quite apparent from reading his responses that he is obviously an
exceptionally intelligent (academically anyway) individual. I find it
hard to
Tyler Durden wrote:
So. Why don't we see terrorist attacks in Sweden, or Switzerland, or
Belgium or any other country that doesn't have any military or
Imperliast presence in the middle east? Is this merely a coincidence?
What I strongly suspect is that if we were not dickin' around over there
Tyler Durden wrote:
So. Why don't we see terrorist attacks in Sweden, or Switzerland, or
Belgium or any other country that doesn't have any military or
Imperliast presence in the middle east? Is this merely a coincidence?
What I strongly suspect is that if we were not dickin' around over there
Damian Gerow wrote:
I've had more than one comment about my ID photos that amount to basically:
You look like you've just left a terrorist training camp. For whatever
reason, pictures of me always come out looking like some crazed religious
fanatic. But that doesn't mean that I'm going to bomb
Damian Gerow wrote:
I've had more than one comment about my ID photos that amount to basically:
You look like you've just left a terrorist training camp. For whatever
reason, pictures of me always come out looking like some crazed religious
fanatic. But that doesn't mean that I'm going to bomb
R.A. Hettinga wrote:
The technology at the core of Certicom's products - elliptic-curve
cryptography, or ECC - is well suited to such purposes since it can work
faster and requires less computing power and storage than conventional
forms of cryptography, he said.
Well, best of luck to them. any
R.A. Hettinga wrote:
The technology at the core of Certicom's products - elliptic-curve
cryptography, or ECC - is well suited to such purposes since it can work
faster and requires less computing power and storage than conventional
forms of cryptography, he said.
Well, best of luck to them. any
J.A. Terranson wrote:
Which of course neatly sidesteps the issue that a DRIVERS LICENSE is
not identification, it is proof you have some minimum competency to
operate a motor vehicle...
IIRC, several states have taken to issuing a no compentency driving
licence (ie, the area that says what that
Riad S. Wahby wrote:
...except (ta-d) the passport, which is universally accepted by
liquor stores AFAICT.
And how many americans have a passport,and carry one for identification
purposes?
J.A. Terranson wrote:
Which of course neatly sidesteps the issue that a DRIVERS LICENSE is
not identification, it is proof you have some minimum competency to
operate a motor vehicle...
IIRC, several states have taken to issuing a no compentency driving
licence (ie, the area that says what that
Riad S. Wahby wrote:
...except (ta-d) the passport, which is universally accepted by
liquor stores AFAICT.
And how many americans have a passport,and carry one for identification
purposes?
Steve Furlong wrote:
On Thu, 2004-10-07 at 14:50, Dave Howe wrote:
The regular encryption scheme (last I looked at a QKE product) was XOR
Well, if it's good enough for Microsoft, it's good enough for everyone.
I have it on good authority that Microsoft's designers and programmers
are second
Tyler Durden wrote:
Oops. You're right. It's been a while. Both photons are not utilized,
but there's a Private channel and a public channel. As for MITM attacks,
however, it seems I was right more or less by accident, and the
collapsed ring configuration seen in many tightly packed metro areas
Steve Furlong wrote:
On Thu, 2004-10-07 at 14:50, Dave Howe wrote:
The regular encryption scheme (last I looked at a QKE product) was XOR
Well, if it's good enough for Microsoft, it's good enough for everyone.
I have it on good authority that Microsoft's designers and programmers
are second
Tyler Durden wrote:
Oops. You're right. It's been a while. Both photons are not utilized,
but there's a Private channel and a public channel. As for MITM attacks,
however, it seems I was right more or less by accident, and the
collapsed ring configuration seen in many tightly packed metro areas
Major Variola (ret) wrote:
There is a bill in this year's Ca election to require DNA sampling of
anyone arrested. Not convicted of a felony, but arrested.
Doesn't surprise me - the UK police collected a huge bunch of
fingerprints and dna samples for elimination purposes during one of
the
walking distance, sending high volumes of
extremely sensitive material between them)
-TD
From: Dave Howe [EMAIL PROTECTED]
To: Email List: Cryptography [EMAIL PROTECTED],
Email List: Cypherpunks [EMAIL PROTECTED]
Subject: Re: QC Hype Watch: Quantum cryptography gets practical
Date: Tue
Dave Howe wrote:
I think this is part of the
purpose behind the following paper:
http://eprint.iacr.org/2004/229.pdf
which I am currently trying to understand and failing miserably at *sigh*
Nope, finally strugged to the end to find a section pointing out that it
does *not* prevent mitm attacks
walking distance, sending high volumes of
extremely sensitive material between them)
-TD
From: Dave Howe [EMAIL PROTECTED]
To: Email List: Cryptography [EMAIL PROTECTED],
Email List: Cypherpunks [EMAIL PROTECTED]
Subject: Re: QC Hype Watch: Quantum cryptography gets practical
Date: Tue
Major Variola (ret) wrote:
There is a bill in this year's Ca election to require DNA sampling of
anyone arrested. Not convicted of a felony, but arrested.
Doesn't surprise me - the UK police collected a huge bunch of
fingerprints and dna samples for elimination purposes during one of
the
Dave Howe wrote:
I think this is part of the
purpose behind the following paper:
http://eprint.iacr.org/2004/229.pdf
which I am currently trying to understand and failing miserably at *sigh*
Nope, finally strugged to the end to find a section pointing out that it
does *not* prevent mitm attacks
R. A. Hettinga wrote:
Two factors have made this possible: the
vast stretches of optical fiber (lit and dark) laid in metropolitan areas,
which very conveniently was laid from one of your customers to another
of your customers (not between telcos?) - or are they talking only
having to lay new
R. A. Hettinga wrote:
Two factors have made this possible: the
vast stretches of optical fiber (lit and dark) laid in metropolitan areas,
which very conveniently was laid from one of your customers to another
of your customers (not between telcos?) - or are they talking only
having to lay new
Major Variola (ret) wrote:
t 11:22 PM 10/1/04 -0700, Bill Stewart wrote:
In the US its generally illegal to tattoo someone who is drunk.
Not sure about that - certainly its illegal in the UK to tattoo for a
number of reasons, but the drunkenness one usually comes down to is not
capable of giving
Major Variola (ret) wrote:
t 11:22 PM 10/1/04 -0700, Bill Stewart wrote:
In the US its generally illegal to tattoo someone who is drunk.
Not sure about that - certainly its illegal in the UK to tattoo for a
number of reasons, but the drunkenness one usually comes down to is not
capable of giving
Morlock Elloi wrote:
Hint: all major cryptanalytic advances, where governments broke a cypher and
general public found out few *decades* later were not of brute-force kind.
all generalizations are false, including this one.
most of the WWII advances in computing were to brute-force code engines,
Pete Capelli wrote:
On Thu, 05 Aug 2004 20:07:23 +0100, Dave Howe [EMAIL PROTECTED] wrote:
all generalizations are false, including this one.
Is this self-referential?
yes - some generalizations are accurate - and its also a quote, but I
may have misworded it so I didn't quotemark it or supply
Pete Capelli wrote:
On Thu, 05 Aug 2004 20:07:23 +0100, Dave Howe [EMAIL PROTECTED] wrote:
all generalizations are false, including this one.
Is this self-referential?
yes - some generalizations are accurate - and its also a quote, but I
may have misworded it so I didn't quotemark it or supply
Particularly disgusted by the last paragraph
|http://www.visual-mp3.com/review/14986.html
|
| X-Cipher - Secure Encrypted Communications
|
|The Internet is a wonderful shared transmission technology, allowing
|any one part of the Internet to communicate to any other part of the
|Internet. Like
Particularly disgusted by the last paragraph
|http://www.visual-mp3.com/review/14986.html
|
| X-Cipher - Secure Encrypted Communications
|
|The Internet is a wonderful shared transmission technology, allowing
|any one part of the Internet to communicate to any other part of the
|Internet. Like
Jack Lloyd wrote:
Well, nothing stopping you from treating your datagram-based VPN (ie, DTLS) as
an IP tunnel, and doing TCP-like stuff on top of it to handle the IM and file
transfer. Actually I'm working on something rather like that now, which may or
not get finished soon.
*lol* aren't we all.
Thomas Shaddack wrote:
The easiest way is probably a hybrid of telephone/modem, doing normal
calls in analog voice mode and secure calls in digital modem-to-modem
connection. The digital layer may be done best over IP protocol, assigning
IP addresses to the phones and making them talk over TCP
Jack Lloyd wrote:
How well is VoIP going to work over SSL/TLS (ie, TCP) though?
you can do SSL over UDP if you like - I think most VPN software is UDP
only, while OpenVPN has a fallback TCP mode for cases where you can't
use UDP (and TBH there aren't many)
I've never used
any VoIP-over-TCP
Thomas Shaddack wrote:
The easiest way is probably a hybrid of telephone/modem, doing normal
calls in analog voice mode and secure calls in digital modem-to-modem
connection. The digital layer may be done best over IP protocol, assigning
IP addresses to the phones and making them talk over TCP
Jack Lloyd wrote:
How well is VoIP going to work over SSL/TLS (ie, TCP) though?
you can do SSL over UDP if you like - I think most VPN software is UDP
only, while OpenVPN has a fallback TCP mode for cases where you can't
use UDP (and TBH there aren't many)
I've never used
any VoIP-over-TCP
Eric Cordian wrote:
Email is free. That is why we have a spam problem. If email required 37
cent stamps, it would be no more annoying than junk snailmail.
it might be free in america - but it isn't here in the UK even at low
bandwidths - say, 56K. The sort of bandwidth a professional spammer
Eric Cordian wrote:
But Nigeria is a very poor country, with high unemployment, where
people are forced by economic circumstances to do almost anything to
try and feed their families. I see no reason to be proud of
reverse-scamming a Nigerian out of $80 when it might be his entire
family's
Eric Cordian wrote:
But Nigeria is a very poor country, with high unemployment, where
people are forced by economic circumstances to do almost anything to
try and feed their families. I see no reason to be proud of
reverse-scamming a Nigerian out of $80 when it might be his entire
family's
Eric Cordian wrote:
I have a dual boot system which normally runs Linux. Since it had
been a couple of months since I last ran XP, I booted it on Tuesday
to run Windows Update, and keep it current with critical patches.
Within minutes, before I had even downloaded the first update, my box
Eric Cordian wrote:
I have a dual boot system which normally runs Linux. Since it had
been a couple of months since I last ran XP, I booted it on Tuesday
to run Windows Update, and keep it current with critical patches.
Within minutes, before I had even downloaded the first update, my box
http://www.cse.ucsd.edu/users/tkohno/papers/WinZip/
Abstract: WinZip is a popular compression utility for Microsoft Windows
computers, the latest version of which is advertised as having
easy-to-use AES encryption to protect your sensitive data. We exhibit
several attacks against WinZip's new
Tyler Durden wrote:
HANOVER, Germany -- German police have arrested an 18-year-old man
suspected of creating the Sasser computer worm, believed to be one of
the Internet's most costly outbreaks of sabotage.
Note the language...an 18 year old MAN and sabotage...
So a HS kid, living with his
Tyler Durden wrote:
HANOVER, Germany -- German police have arrested an 18-year-old man
suspected of creating the Sasser computer worm, believed to be one of
the Internet's most costly outbreaks of sabotage.
Note the language...an 18 year old MAN and sabotage...
So a HS kid, living with his
opinions?
http://www.wisdom.weizmann.ac.il/~tromer/acoustic/
opinions?
http://www.wisdom.weizmann.ac.il/~tromer/acoustic/
R. A. Hettinga wrote:
http://www.theregister.co.uk/2004/05/05/complete_idcard_guide/print.html
. And employee checks? Here comes the
stick. Employers don't at the moment have to check immigration status
when they hire someone, so why would they? Indeed, why would they
care? But under the
An Metet wrote:
What technologies currently exist for receiving a/psuedononymous
message? With Mixmaster, sending mail, posting news, and even blog
posting are possible, However, receiving replies securely or, better,
holding a private conversation is difficult or impossible. Best bet
seems
Eugen Leitl wrote:
On Thu, Apr 22, 2004 at 01:13:48AM +0100, Dave Howe wrote:
No, it is a terrible situation.
It establishes a legal requirement that communications *not* be
private from the feds. from there, it is just a small step to
defining encryption as a deliberate attempt to circumvent
R. A. Hettinga wrote:
At 12:09 PM +0200 4/22/04, Eugen Leitl wrote:
Are you truly expecting a worldwide ban on encryption?
It's like expecting a worldwide ban on finance. Been tried. Doesn't
work.
There isn't a worldwide ban on breaking CSS - doesn't stop the film
industry trying to enforce it
Morlock Elloi wrote:
The extreme ease of use of internet wiretapping and lack of
accountability is not a good situation to create.
False.
It is the best possible situation cpunk-wise I can imagine.
No, it is a terrible situation.
It establishes a legal requirement that communications *not* be
Eugen Leitl wrote:
On Thu, Apr 22, 2004 at 01:13:48AM +0100, Dave Howe wrote:
No, it is a terrible situation.
It establishes a legal requirement that communications *not* be
private from the feds. from there, it is just a small step to
defining encryption as a deliberate attempt to circumvent
R. A. Hettinga wrote:
At 12:09 PM +0200 4/22/04, Eugen Leitl wrote:
Are you truly expecting a worldwide ban on encryption?
It's like expecting a worldwide ban on finance. Been tried. Doesn't
work.
There isn't a worldwide ban on breaking CSS - doesn't stop the film
industry trying to enforce it
Riad S. Wahby wrote:
SAN FRANCISCO (Reuters) - A California state senator on Monday said
she was drafting legislation to block Google Inc.'s free e-mail
service Gmail because it would place advertising in personal
messages after searching them for key words.
Is she planning to block all the
Justin wrote:
It's not just a private interaction between two consenting parties.
It's a contract that grants power to a third party eliminating
traditional legal guarantees of quasi-privacy in communication from
sender to recipient, one of which is not a party to the contract.
There's no
Riad S. Wahby wrote:
SAN FRANCISCO (Reuters) - A California state senator on Monday said
she was drafting legislation to block Google Inc.'s free e-mail
service Gmail because it would place advertising in personal
messages after searching them for key words.
Is she planning to block all the
[EMAIL PROTECTED] wrote:
If you're not the driver and you don't drive you don't have to have
an ID. And you can't show what you don't have.
IIRC, in the case above the guy was outside his car - his daughter (still
in the car) may well have been the driver, not him
[EMAIL PROTECTED] wrote:
If you're not the driver and you don't drive you don't have to have
an ID. And you can't show what you don't have.
IIRC, in the case above the guy was outside his car - his daughter (still
in the car) may well have been the driver, not him
Interesting looking case coming up soon - an employee (whose motives are
probably dubious, but still :) installed a keyghost onto his boss' pc and
was charged with unauthorised wire tapping.
That isn't the interesting bit. the interesting bit is this is IIRC exactly
how the FBI obtained Scarfo's
Interesting looking case coming up soon - an employee (whose motives are
probably dubious, but still :) installed a keyghost onto his boss' pc and
was charged with unauthorised wire tapping.
That isn't the interesting bit. the interesting bit is this is IIRC exactly
how the FBI obtained Scarfo's
Riad S. Wahby wrote:
John Young [EMAIL PROTECTED] wrote:
Despite the long-lived argument that public review of crypto assures
its reliability, no national infosec agency -- in any country
worldwide -- follows that practice for the most secure systems.
NSA's support for
AES notwithstanding,
Riad S. Wahby wrote:
John Young [EMAIL PROTECTED] wrote:
Despite the long-lived argument that public review of crypto assures
its reliability, no national infosec agency -- in any country
worldwide -- follows that practice for the most secure systems.
NSA's support for
AES notwithstanding,
Tyler Durden wrote:
Encryption ain't the half of it. Really good liottle article. And I
didin't know Skype was based in Luxemborg
http://slate.msn.com/id/2095777/
Not playing with Skype - why risk a closed source propriatory solution
when there is open source, RFC documented SIP?
Tyler Durden wrote:
Encryption ain't the half of it. Really good liottle article. And I
didin't know Skype was based in Luxemborg
http://slate.msn.com/id/2095777/
Not playing with Skype - why risk a closed source propriatory solution
when there is open source, RFC documented SIP?
Sarad AV wrote:
is it true or just another make up so as to make its
citizens feel justified when they go invade another
nation.How much effort does it take to get credible
information of 5 million people oveseas?
Not really that much, provided you are willing to preassume attended an
anti-war
Bah, I really miss the crap-filtered version of cypherpunks
can anyone recommend a better node than the one I am using now?
Would something like this go over in the US? I wonder ...
I thought that there was already a levy on blank CDR media in the US;
there is certainly already one on blank audio tapes...
[EMAIL PROTECTED] wrote:
http://www.topsecretcrypto.com/
Snake oil?
I am not entirely sure.
on the plus side - it apparently uses Sha-1 for a signing algo, RSA with a
max keysize of 16Kbits (overkill, but better than enforcing something
stupidly small), built in NTP synch for timestamps
1 - 100 of 175 matches
Mail list logo