Re: Anti-snooping operating system close to launch

2002-05-29 Thread Morlock Elloi
Anti-snooping operating system close to launch http://www.m-o-o-t.org/ didn't change much code-wise in the last year or so, except for the news section. = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Yahoo! - Official partner of 2002 FIFA World Cup

Key verification schemes...

2002-05-29 Thread Curt Smith
(in response to a topic mentioned in various threads) I agree that neither CA-verification nor WoT-verification is as useful as Key Fingerprint-verification for secure communication between crypto-aware individuals. After all, CA's can be subverted and WoT is probably best used as a back-up

ANSI X9.17 STANDARDS

2002-05-29 Thread gfgs pedo
hi, I have an idea of what x9.17 standards says but no idea behind the mathametcial background of it. x9.17 standards is a standard but why is it so.mathametically what makes it a secure key generator? Could some 1 pls address the issue. Thank u very much. Data.

When encryption is also authentication...

2002-05-29 Thread Curt Smith
I agree that under-the-hood encryption is becoming more and more prevalent, and that it generally improves security. Also, the widespread use of encryption technology helps protect cryptorights in general as important to the public good. The fundamental problem with under-the-hood is that the

Re: Government subsidies: our last, best hope for Cryptanarchy?

2002-05-29 Thread Adam Shostack
Hey, most of your points about crypto going under the hood are well taken. I wanted to echo Peter Gutmann's comments about PGP, and add that I see PGP as a protocol, and most of the protocols I use daily (TCP, IP, UDP, DNS, HTTP, SMTP) have not changed in the last 10 years and I don't need to

Re: When encryption is also authentication...

2002-05-29 Thread Graham Lally
Mike Rosing wrote: If digital crypto, signatures or e-cash are going to get into mass appeal, then their operations will be magic to the majority. And it all has to work, to 1 part in 10^8th or better, without user comprehension. It may well take user intervention to create a signature,

Re: When encryption is also authentication...

2002-05-29 Thread Curt Smith
I agree that the signer does not need to understand the mathematics or underlying technology for digital signatures to be viable. However, what good is an agreement when the parties do not know what the terms of the agreement are? A signature (digital or otherwise) generally indicates that the

Re: When encryption is also authentication...

2002-05-29 Thread Mike Rosing
On Wed, 29 May 2002, Curt Smith wrote: I agree that under-the-hood encryption is becoming more and more prevalent, and that it generally improves security. Also, the widespread use of encryption technology helps protect cryptorights in general as important to the public good. This is kinda

Why asymmetrical warefare practitioners have nothing to fear from the FBI (and probably the rest of U.S. intelligence/law enforcement)

2002-05-29 Thread keyser-soze
[An edited copy of Who Let the Terrorists Succeed? http://www.msnbc.com/news/758330.asp] The now-famous memo Minneapolis agent Coleen Rowley sent to Robert Mueller, director of the FBI, now widely known as the Federal Bureau of Incompetence. The May 21, 2002 memo, obtained by Time, is one