Anti-snooping operating system close to launch
http://www.m-o-o-t.org/ didn't change much code-wise in the last year or so,
except for the news section.
=
end
(of original message)
Y-a*h*o-o (yes, they scan for this) spam follows:
Yahoo! - Official partner of 2002 FIFA World Cup
(in response to a topic mentioned in various threads)
I agree that neither CA-verification nor WoT-verification is as
useful as Key Fingerprint-verification for secure communication
between crypto-aware individuals. After all, CA's can be
subverted and WoT is probably best used as a back-up
hi,
I have an idea of what x9.17 standards says
but no idea behind the mathametcial background of it.
x9.17 standards is a standard but why is it
so.mathametically what makes it a secure key
generator?
Could some 1 pls address the issue.
Thank u very much.
Data.
I agree that under-the-hood encryption is becoming more and
more prevalent, and that it generally improves security. Also,
the widespread use of encryption technology helps protect
cryptorights in general as important to the public good.
The fundamental problem with under-the-hood is that the
Hey, most of your points about crypto going under the hood are well
taken. I wanted to echo Peter Gutmann's comments about PGP, and add
that I see PGP as a protocol, and most of the protocols I use daily
(TCP, IP, UDP, DNS, HTTP, SMTP) have not changed in the last 10 years
and I don't need to
Mike Rosing wrote:
If digital crypto, signatures or e-cash are going to get into mass appeal,
then their operations will be magic to the majority. And it all has to
work, to 1 part in 10^8th or better, without user comprehension.
It may well take user intervention to create a signature,
I agree that the signer does not need to understand the
mathematics or underlying technology for digital signatures to
be viable. However, what good is an agreement when the parties
do not know what the terms of the agreement are? A signature
(digital or otherwise) generally indicates that the
On Wed, 29 May 2002, Curt Smith wrote:
I agree that under-the-hood encryption is becoming more and
more prevalent, and that it generally improves security. Also,
the widespread use of encryption technology helps protect
cryptorights in general as important to the public good.
This is kinda
[An edited copy of Who Let the Terrorists Succeed?
http://www.msnbc.com/news/758330.asp]
The now-famous memo Minneapolis agent Coleen Rowley sent to Robert Mueller, director
of the FBI, now widely known as the Federal Bureau of Incompetence. The May 21, 2002
memo, obtained by Time, is one