Ok, ok. I get tha point. I've scheduled self-flagellation for later. Let's drop this thread already.
-----Original Message----- From: Mat Branyon To: [email protected] Sent: 6/19/03 4:00 PM Subject: Re: [brlug-general] we need more encryption was RE: NSA's decryption clusters vs GPG, et.al. Yea, outlook, what is that? I don't see it in the portage tree... Must be beta or something, maybe alpha still. --mat On Thu, 2003-06-19 at 15:26, Alvaro Zuniga wrote: > No sure what you are talking about? I use Kmail. > > On Thursday 19 June 2003 09:20 am, Dustin Puryear wrote: > > On behalf of the group: Why the heck do you keep using this weird > > my-responses-are-marked-with-John quoting style? Are you having a problem > > with Outlook? > > > > At 06:40 PM 6/18/2003 -0500, you wrote: > > >-----Original Message----- > > > > From: Alvaro Zuniga > > > > >To: [email protected] > > >Sent: 6/18/03 6:20 PM > > >Subject: Re: NSA's decryption clusters vs GPG, et.al. was RE: GPG does not > > >pro vide "end to end encryption", but only mail c onte nt encryption was > > > RE: [brlug-general] Cox and smtp pain today. > > > > > >Dear John: > > > > > >I suppose from this point of view there is not need to even bother with > > >encryption because brute force eventually prevails. > > > > > >John: Not at all. The dilemma that the NSA faces is that they want to > > >decrypt messages A,B,C,... but they will always have limited resources to > > >perform brute force decryption. So, they better be damned sure that > > > message A is the most important of all the messages they want to decrypt. > > > > > >However, a better cipher requires that many more computers exponentially; > > >therefore, we could at least make it more difficult for those who really > > >care about our business. > > > > > >John: Or just have more people using encryption. I've read estimates that > > >less than 1% of Internet traffic is encrypted. By merely advocating that > > >more people use encryption and raising that to 2%, we would require the > > > NSA and other intelligence operations to double their decryption > > > resources. This is the nightmare scenario that keeps the NSA IT Director > > > up at night. > > > > > >This reminds me of that John Travolta movie swordfish where the computer > > >person gradually quintuple the encryption of an algorithm to hide a bank > > >account. He also kept switching the values every few seconds ensuring > > >that it would be impossible to decrypt using brute force. > > > > > >John: As long as those values are random enough. If any pattern to those > > >values could be predicted and duplicated, brute force would still work. > > > > > >John Hebert > > >_______________________________________________ > > >General mailing list > > >[email protected] > > >http://brlug.net/mailman/listinfo/general_brlug.net > > > > > >_______________________________________________ > > >General mailing list > > >[email protected] > > >http://brlug.net/mailman/listinfo/general_brlug.net > > > > --- > > Dustin Puryear <[EMAIL PROTECTED]> > > Puryear Information Technology > > Windows, UNIX, and IT Consulting > > http://www.puryear-it.com > > > > > > _______________________________________________ > > General mailing list > > [email protected] > > http://brlug.net/mailman/listinfo/general_brlug.net > > > _______________________________________________ > General mailing list > [email protected] > http://brlug.net/mailman/listinfo/general_brlug.net
