A faster test for PRIMALITY.

2002-08-16 Thread Gary Jeffers
OK, the following addition is a little cleaner than the 1st edition. My fellow Cypherpunks, Lucky Green says: AFICT, the proposed algorithm is for a test for primality and does not represent an algorithm to factor composites. Well, pardon me! I was in a hurry and should have proof read.

RE: TCPA hack delay appeal

2002-08-16 Thread Lucky Green
AARG! Wrote: It seems that there is (a rather brilliant) way to bypass TCPA (as spec-ed.) I learned about it from two separate sources, looks like two independent slightly different hacks based on the same protocol flaw. Undoubtedly, more people will figure this out. Hopefully some

Re: TCPA not virtualizable during ownership change (Re: Overcoming the potential downside of TCPA)

2002-08-16 Thread lynn . wheeler
I arrived at that decision over four years ago ... TCPA possibly didn't decide on it until two years ago. In the assurance session in the TCPA track at spring 2001 intel developer's conference I claimed my chip was much more KISS, more secure, and could reasonably meet the TCPA requirements at

Give Mongo his due.

2002-08-16 Thread Matthew X
Pay attention to the antitrust angle. I guarantee you that Microsoft believes Pd is a way to extend its market share, not to increase competition Bruce. This was the first thing our resident state hater Mong picked up on.Its would be under ACCC investigation down here in 5 nanoseconds...I

Bay area cypherpunks

2002-08-16 Thread dmolnar
Hi, I am currently in the SF Bay Area and wondering whether any cypherpunks are around and might want to say hi. Right now I'm in Berkeley, but I'm willing to travel (public transportation) to see people. thanks, -David Molnar

Re: employment market for applied cryptographers?

2002-08-16 Thread dmolnar
On Fri, 16 Aug 2002, Adam Back wrote: failure to realise this issue or perhaps just not caring, or lack of financial incentives to care on the part of software developers. Microsoft is really good at this one. The number of times they re-used RC4 keys in different protocols is amazing!

Jim Bell system 2.

2002-08-16 Thread Matthew X
http://www.anti-state.com/vroman/vroman9.html The Jim Bell System Revisited by Robert Vroman Ed. note: This article reflects the views of the author ONLY, not the editors. We have no official opinion whatsoever on the Jim Bell System, aka Assassination Politics. Please see Robert Vroman's

Re: trade-offs of secure programming with Palladium (Re: Palladiu m: technical limits and implications)

2002-08-16 Thread Bettina Jodda (Twister)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Thursday 15 August 2002 19:53, Trei, Peter wrote: Take off your economic hat, and try on a law-enforcement one. With DMCA, etal, the tools to get around TCPA's taking of your right to use your property as you please have been criminalized.

Re: employment market for applied cryptographers?

2002-08-16 Thread Perry E. Metzger
Adam Back [EMAIL PROTECTED] writes: Are there any more definitive security industry stats? Are applied crypto people suffering higher rates of unemployment than general application programmers? (From my statistically too small sample of acquaintances it might appear so.) Hard to say.

Re: employment market for applied cryptographers?

2002-08-16 Thread Adam Shostack
Hey, this is off-topic for DRM-punks! ;) more seriously: I think the fundamental issue is that crypto doesn't really solve many business problems, and it may solve fewer security problems. See Bellovin's work on how many vulnerabilities would be blocked by strong crypto. The buying public can't

ECrimes document clueless on 802.11b

2002-08-16 Thread Khoder bin Hakkin
Stand-Alone and Laptop Computer Evidence d. Check for outside connectivity (e.g., telephone modem, cable, ISDN, DSL). If a telephone connection is present, attempt to identify the telephone number. http://www.ncjrs.org/pdffiles1/nij/187736.pdf -- Better bombing through chemistry. -John Pike,

RE: TCPA hack delay appeal

2002-08-16 Thread Mike Rosing
On Thu, 15 Aug 2002, Lucky Green wrote: Hopefully some of those people will not limit themselves to hypothetical attacks against The Spec, but will actually test those supposed attacks on shipping TPMs. Which are readily available in high-end IBM laptops. But doesn't the owner of the box

RE: employment market for applied cryptographers?

2002-08-16 Thread despot
Having devoted security personnel is a low priority at most companies. General engineers will be tasked with figuring out how to incorporate security and cryptography into products. I have visited many a company where I am talking to a room full of very sharp engineers, but there is a fundamental