http://swissnet.ai.mit.edu/6805/student-papers/spring02-papers/caps.htm
Abstract
To improve the efficiency of airport security screening, the FAA
deployed the Computer Assisted Passenger Screening system (CAPS) in
1999. CAPS attempts to identify potential terrorists through the use of
profiles
Dr. Mike wrote, patiently, persistently and truthfully:
On Fri, 16 Aug 2002, AARG! Anonymous wrote:
Here are some more thoughts on how cryptography could be used to
enhance user privacy in a system like TCPA. Even if the TCPA group
is not receptive to these proposals, it would be useful
Steps to verify the ring signature file (note: you must have the openssl
library installed):
1. Save http://www.inet-one.com/cypherpunks/dir.2002.08.05-2002.08.11/msg00221.html,
as text, to the file ringsig.c. Delete the paragraph of explanation, and/or any
HTML junk, so the file starts with:
Bruce Schneier wrote about Palladium:
Basically, Pd is Microsoft's attempt to build a trusted computer, much as I
discussed the concept in Secrets and Lies (pages 127-130); read it for
background).
Actually his discussion in the book is about traditional secure OS
concepts such as Multics.
On Fri, 16 Aug 2002, AARG! Anonymous wrote:
Here are some more thoughts on how cryptography could be used to
enhance user privacy in a system like TCPA. Even if the TCPA group
is not receptive to these proposals, it would be useful to have an
understanding of the security issues. And the
At 12:57 PM 8/16/02 -0400, Perry E. Metzger wrote:
...
I've seen very high rates of unemployment among people of all walks of
life in New York of late -- I know a lot of lawyers, systems
administrators, secretaries, advertising types, etc. who are out of
work or have been underemployed for a
At 04:21 AM 8/16/02 -0400, dmolnar wrote:
...
Don't forget schedule pressure, the overhead of bringing in a contractor
to do crypto protocol design, and the not-invented-here syndrome. I think
all of these contribute to keeping protocol design in-house, regardless of
the technical skill of the
Here are some more thoughts on how cryptography could be used to
enhance user privacy in a system like TCPA. Even if the TCPA group
is not receptive to these proposals, it would be useful to have an
understanding of the security issues. And the same issues arise in
many other kinds of systems