--=-awE9J4a0oc2cn9F91Q5B
Content-Type: text/plain
Content-Transfer-Encoding: quoted-printable

Yea, outlook, what is that?  I don't see it in the portage tree... Must
be beta or something, maybe alpha still.

--mat

On Thu, 2003-06-19 at 15:26, Alvaro Zuniga wrote:
> No sure what you are talking about? I use Kmail.
>=20
> On Thursday 19 June 2003 09:20 am, Dustin Puryear wrote:
> > On behalf of the group: Why the heck do you keep using this weird
> > my-responses-are-marked-with-John quoting style? Are you having a probl=
em
> > with Outlook?
> >
> > At 06:40 PM 6/18/2003 -0500, you wrote:
> > >-----Original Message-----
> >
> > From: Alvaro Zuniga
> >
> > >To: [email protected]
> > >Sent: 6/18/03 6:20 PM
> > >Subject: Re: NSA's decryption clusters vs GPG, et.al. was RE: GPG does=
 not
> > >pro vide "end to end encryption", but only mail c onte nt encryption w=
as
> > > RE: [brlug-general] Cox and smtp pain today.
> > >
> > >Dear John:
> > >
> > >I suppose from this point of view there is not need to even bother wit=
h
> > >encryption because brute force eventually prevails.
> > >
> > >John: Not at all. The dilemma that the NSA faces is that they want to
> > >decrypt messages A,B,C,... but they will always have limited resources=
 to
> > >perform brute force decryption. So, they better be damned sure that
> > > message A is the most important of all the messages they want to decr=
ypt.
> > >
> > >However,  a better cipher requires that many more computers exponentia=
lly;
> > >therefore,  we could at least make it more difficult for those who rea=
lly
> > >care about our business.
> > >
> > >John: Or just have more people using encryption. I've read estimates t=
hat
> > >less than 1% of Internet traffic is encrypted. By merely advocating th=
at
> > >more people use encryption and raising that to 2%, we would require th=
e
> > > NSA and other intelligence operations to double their decryption
> > > resources. This is the nightmare scenario that keeps the NSA IT Direc=
tor
> > > up at night.
> > >
> > >This reminds me of that John Travolta movie swordfish where the comput=
er
> > >person gradually quintuple the encryption of an algorithm to hide a ba=
nk
> > >account. He also kept switching the values every few seconds ensuring
> > >that it would be impossible to decrypt using brute force.
> > >
> > >John: As long as those values are random enough. If any pattern to tho=
se
> > >values could be predicted and duplicated, brute force would still work=
.
> > >
> > >John Hebert
> > >_______________________________________________
> > >General mailing list
> > >[email protected]
> > >http://brlug.net/mailman/listinfo/general_brlug.net
> > >
> > >_______________________________________________
> > >General mailing list
> > >[email protected]
> > >http://brlug.net/mailman/listinfo/general_brlug.net
> >
> > ---
> > Dustin Puryear <[EMAIL PROTECTED]>
> > Puryear Information Technology
> > Windows, UNIX, and IT Consulting
> > http://www.puryear-it.com
> >
> >
> > _______________________________________________
> > General mailing list
> > [email protected]
> > http://brlug.net/mailman/listinfo/general_brlug.net
>=20
>=20
> _______________________________________________
> General mailing list
> [email protected]
> http://brlug.net/mailman/listinfo/general_brlug.net

--=-awE9J4a0oc2cn9F91Q5B
Content-Type: application/pgp-signature; name=signature.asc
Content-Description: This is a digitally signed message part

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQA+8iSLadbUG229XJoRAmiTAJ9DAFOnFnK9kB0I+7oiUOpAeed3dACgj6rQ
GSOQdkulKoZKxysP4nB5wYw=
=WNmO
-----END PGP SIGNATURE-----

--=-awE9J4a0oc2cn9F91Q5B--


Reply via email to