At 02:43 AM 8/15/04 +0200, Thomas Shaddack wrote:
On Sat, 14 Aug 2004, Major Variola (ret) wrote:
It was disturbing that, as the bottom fell out of telecom, and
handsets
became commoditized, faceplates and ringtones were highly profitable.
Faceplates are at least made of atoms. There are
At 11:26 PM -0500 8/14/04, Bruce Schneier wrote:
From: Ken Lavender [EMAIL PROTECTED]
Subject: ICS Atlanta
I am APPAULED at your comments that you had made on your website:
http://www.schneier.com/crypto-gram-0407.html#9
You have statements are nothing but slander defamation. They
At 05:30 AM 8/14/04 +0200, Thomas Shaddack wrote:
On Fri, 13 Aug 2004, Major Variola (ret) wrote:
Even if you map a particular hash into one of a million known-benign
values, which takes work, there are multiple orthagonal hash
algorithms
included on the NIST CD. (Eg good luck finding values
--- begin forwarded text
To: Bruce Tefft [EMAIL PROTECTED]
Thread-Index: AcSAr6Y/Mj9PmYHqQZO/G2/Eo29FYgAgaLTg
From: Bruce Tefft [EMAIL PROTECTED]
Mailing-List: list [EMAIL PROTECTED]; contact [EMAIL PROTECTED]
Delivered-To: mailing list [EMAIL PROTECTED]
Date: Fri, 13 Aug 2004 08:30:35 -0400
On Sat, 14 Aug 2004, Major Variola (ret) wrote:
Argh. You misunderstood me. I don't want to find hash collisions, to
create a false known hash - that is just too difficult. I want to make
every file in the machine recognized as unidentifiable.
No, I understood this. In a later post it was
I'd like to invite members of this list to try out my new
hashcash-based server, rpow.net.
This system receives hashcash as a Proof of Work (POW) token, and in
exchange creates RSA-signed tokens which I call Reusable Proof of Work
(RPOW) tokens. RPOWs can then be transferred from person to
Anyone who knows about cryptography quickly comes to the conclusion that if
it's encrypted, and I have the key it's *my* property.
It doesn't matter what the lawyers say -- or even the guys they hire with
guns at your friendly local geographic force monopoly.
:-).
Now if we can figure out a way
We worried about compromized OSes, BIOSes, read last week about
a PNG library bug that lets images run buffer exploits, now CPUs
can be backdoored:
From Scheier's Crypto-gram:
Here's an interesting hardware security vulnerability. Turns out that
it's possible to update the AMD K8 processor
On Sun, 15 Aug 2004, Major Variola (ret) wrote:
We worried about compromized OSes, BIOSes, read last week about
a PNG library bug that lets images run buffer exploits, now CPUs
can be backdoored:
From Scheier's Crypto-gram:
Here's an interesting hardware security vulnerability. Turns