"Steven M. Bellovin" writes:
-+--------------------------
 | .............................. -- that leaves open the possibility of a
 | protocol change that implemented some sort of Clipper-like functionality.
 | A silent change like that would be *very* ominous.
 | 

I'm reminded of Adi Shamir's 2004 Turing Award Lecture

* Absolutely secure systems do not exist
* To halve your vulnerability, you have to double your expenditure
* Cryptography is typically bypassed, not penetrated


--dan


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to