On Tue, 30 Jul 2002, James A. Donald wrote:
The plan, already implemented, is to flood file sharing systems with
bogus files or broken files. The solution, not yet implemented, is to
attach digital signatures to files, and have the file sharing software
recognize certain signatures as good
--
On 29 Jul 2002 at 14:25, Duncan Frissell wrote:
Congressman Wants to Let Entertainment Industry Get Into Your
Computer
Rep. Howard L. Berman, D-Calif., formally proposed
legislation that would give the industry unprecedented new
authority to secretly hack into
On Tue, 30 Jul 2002 20:51:24 -0700, you wrote:
When we approve a file, all the people who approved it already get
added to our trust list, thus helping us select files, and we are
told that so and so got added to our list of people who recommend
good files. This gives people an incentive to
--
On 29 Jul 2002 at 15:35, AARG! Anonymous wrote:
both Palladium and TCPA deny that they are designed to restrict
what applications you run. The TPM FAQ at
http://www.trustedcomputing.org/docs/TPM_QA_071802.pdf reads
They deny that intent, but physically they have that
On Tue, 30 Jul 2002, Major Variola (ret) wrote:
At 07:59 PM 7/29/02 -0500, Jim Choate wrote:
On Mon, 29 Jul 2002, Eric Murray wrote:
Your ISP may be blocking mail from Ssz to you.
Sue their ass your right to free association is being violated!
Um, right after we finish sueing other
James Donald wrote:
On 29 Jul 2002 at 15:35, AARG! Anonymous wrote:
both Palladium and TCPA deny that they are designed to restrict
what applications you run. The TPM FAQ at
http://www.trustedcomputing.org/docs/TPM_QA_071802.pdf reads
They deny that intent, but physically they have
At 11:01 AM 7/31/2002 +0200, Eugen Leitl wrote:
On Tue, 30 Jul 2002, James A. Donald wrote:
The plan, already implemented, is to flood file sharing systems with
bogus files or broken files. The solution, not yet implemented, is to
attach digital signatures to files, and have the file
On Wed, 31 Jul 2002, Anonymous wrote:
Such an approach suffers from the bad guy occasionally signing a
good file, thus placing himself on the trusted signer list.
This assumes a boolean trust metric. What you need is a trust scalar, and
a mechanism to prevent Malory poisoning it. It should
At 08:06 AM 7/31/2002 -0700, A.Melon wrote:
What do you have to hide?
If I have nothing to hide, nobody wants to know.
steve
I imagine there's a world of difference between will and would.
-Declan
On Mon, Jul 29, 2002 at 03:35:32PM -0700, AARG!Anonymous wrote:
Can you find anything in this spec that would do what David Wagner says
above, restrict what applications you could run? Despite studying this
spec for
Anonymous wrote:
On Tue, 30 Jul 2002 20:51:24 -0700, you wrote:
When we approve a file, all the people who approved it already get
added to our trust list, thus helping us select files, and we are
told that so and so got added to our list of people who recommend
good files. This gives people
On Tue, 30 Jul 2002, James A. Donald wrote:
--
On 29 Jul 2002 at 15:35, AARG! Anonymous wrote:
both Palladium and TCPA deny that they are designed to restrict
what applications you run. The TPM FAQ at
http://www.trustedcomputing.org/docs/TPM_QA_071802.pdf reads
They deny
On Wednesday, July 31, 2002, at 04:51 am, James A. Donald wrote:
On 29 Jul 2002 at 15:35, AARG! Anonymous wrote:
both Palladium and TCPA deny that they are designed to restrict
what applications you run. The TPM FAQ at
http://www.trustedcomputing.org/docs/TPM_QA_071802.pdf reads
AARG! Anonymous wrote:
James Donald wrote:
On 29 Jul 2002 at 15:35, AARG! Anonymous wrote:
both Palladium and TCPA deny that they are designed to restrict
what applications you run. The TPM FAQ at
http://www.trustedcomputing.org/docs/TPM_QA_071802.pdf reads
They deny that intent, but
WHITE HOUSE SOUNDS CALL FOR NEW INTERNET STANDARDS
The Bush administration's cyber security czar, Richard Clarke, said it might
be time to replace the creaky, cranky 20-year-old protocols that drive the
Internet with standards better able to accommodate a flood of new wireless
devices. Wireless
--
On 31 Jul 2002 at 11:01, Eugen Leitl wrote:
The issue of node reputation is completely orthogonal to the
document hashes not colliding. Reputation based systems are
useful, because document URI
http://localhost:4711/f70539bb32961f3d7dba42a9c51442c1218a9100
doesn't say what's in
--
29 Jul 2002 at 15:35, AARG! Anonymous wrote:
both Palladium and TCPA deny that they are designed to
restrict what applications you run.
James A. Donald:
They deny that intent, but physically they have that
capability.
On 31 Jul 2002 at 16:10, Nicko van Someren wrote:
And all
On Wed, 31 Jul 2002, Steve Schear wrote:
Looks amazingly familiar. Could it be, could be, could it be Mojo
Nation (now MNet http://mnet.sourceforge.net )?
Or OpenCM (http://www.opencm.org)
-Jack
--
James A. Donald:
The plan, already implemented, is to flood file sharing
systems with bogus files or broken files. The solution, not
yet implemented, is to attach digital signatures to files, and
have the file sharing software recognize certain signatures as
good or bad.
Eugen
One useful piece of advice:
Don't but pizza with a credit card:
SNIP
Course all those terrorists buying their pizzas with cash get away clean.
I've wondered for years how much longer this
will be allowed. Cash is still viable. Not
as viable as it was 10, or even 5 years ago.
Jack Lloyd wrote:
On Wed, 31 Jul 2002, Steve Schear wrote:
Looks amazingly familiar. Could it be, could be, could it be Mojo
Nation (now MNet http://mnet.sourceforge.net )?
Or OpenCM (http://www.opencm.org)
-Jack
On the OpenCM webpage, it proclaims on the right hand side:
OpenCM
21 matches
Mail list logo