--=-awE9J4a0oc2cn9F91Q5B Content-Type: text/plain Content-Transfer-Encoding: quoted-printable
Yea, outlook, what is that? I don't see it in the portage tree... Must be beta or something, maybe alpha still. --mat On Thu, 2003-06-19 at 15:26, Alvaro Zuniga wrote: > No sure what you are talking about? I use Kmail. >=20 > On Thursday 19 June 2003 09:20 am, Dustin Puryear wrote: > > On behalf of the group: Why the heck do you keep using this weird > > my-responses-are-marked-with-John quoting style? Are you having a probl= em > > with Outlook? > > > > At 06:40 PM 6/18/2003 -0500, you wrote: > > >-----Original Message----- > > > > From: Alvaro Zuniga > > > > >To: [email protected] > > >Sent: 6/18/03 6:20 PM > > >Subject: Re: NSA's decryption clusters vs GPG, et.al. was RE: GPG does= not > > >pro vide "end to end encryption", but only mail c onte nt encryption w= as > > > RE: [brlug-general] Cox and smtp pain today. > > > > > >Dear John: > > > > > >I suppose from this point of view there is not need to even bother wit= h > > >encryption because brute force eventually prevails. > > > > > >John: Not at all. The dilemma that the NSA faces is that they want to > > >decrypt messages A,B,C,... but they will always have limited resources= to > > >perform brute force decryption. So, they better be damned sure that > > > message A is the most important of all the messages they want to decr= ypt. > > > > > >However, a better cipher requires that many more computers exponentia= lly; > > >therefore, we could at least make it more difficult for those who rea= lly > > >care about our business. > > > > > >John: Or just have more people using encryption. I've read estimates t= hat > > >less than 1% of Internet traffic is encrypted. By merely advocating th= at > > >more people use encryption and raising that to 2%, we would require th= e > > > NSA and other intelligence operations to double their decryption > > > resources. This is the nightmare scenario that keeps the NSA IT Direc= tor > > > up at night. > > > > > >This reminds me of that John Travolta movie swordfish where the comput= er > > >person gradually quintuple the encryption of an algorithm to hide a ba= nk > > >account. He also kept switching the values every few seconds ensuring > > >that it would be impossible to decrypt using brute force. > > > > > >John: As long as those values are random enough. If any pattern to tho= se > > >values could be predicted and duplicated, brute force would still work= . > > > > > >John Hebert > > >_______________________________________________ > > >General mailing list > > >[email protected] > > >http://brlug.net/mailman/listinfo/general_brlug.net > > > > > >_______________________________________________ > > >General mailing list > > >[email protected] > > >http://brlug.net/mailman/listinfo/general_brlug.net > > > > --- > > Dustin Puryear <[EMAIL PROTECTED]> > > Puryear Information Technology > > Windows, UNIX, and IT Consulting > > http://www.puryear-it.com > > > > > > _______________________________________________ > > General mailing list > > [email protected] > > http://brlug.net/mailman/listinfo/general_brlug.net >=20 >=20 > _______________________________________________ > General mailing list > [email protected] > http://brlug.net/mailman/listinfo/general_brlug.net --=-awE9J4a0oc2cn9F91Q5B Content-Type: application/pgp-signature; name=signature.asc Content-Description: This is a digitally signed message part -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.2 (GNU/Linux) iD8DBQA+8iSLadbUG229XJoRAmiTAJ9DAFOnFnK9kB0I+7oiUOpAeed3dACgj6rQ GSOQdkulKoZKxysP4nB5wYw= =WNmO -----END PGP SIGNATURE----- --=-awE9J4a0oc2cn9F91Q5B--
