> Hi Jason,
>
> encryption can be achive with just core
> but it is better not discuss it on the list
> (per RT request)
>
> [EMAIL PROTECTED]

Hi Tom

Thanks for your reply. I am listening ...

./Jason

> On Tue, 18 Dec 2001, Jason Cunliffe wrote:
>
> > > You could always implement encryption yourself and
> > > send the files between REBOL client program to
> > > REBOL server using a custom protocol. There are any
> > > number of free sources describing cryptographic
> > > algorithms on the web; the main problem with
> > > implementing them in REBOL may be performance,
> > > since REBOL isn't entirely a speed demon for
> > > math, as I understand it.
> >
> > Thanks. Yes I tend to believe the easiest adn often most effective
security
> > is simply small customized tools designed to play together on both
client
> > and server. For that one can use almost anything, images, flash, rebol
.. 6
> > different sister emails designed to be re-assembled etc.
> >
> > Am I right in understanding that the cryptographic needs are only for
> > generating codes? They do not need to run all the time? If so, REBOL's
math
> > crunching speed is not really an obstacle.
> >
> > Today I upgraded my version of F-Secures SSH-Telnet Client. They ahave a
> > really cool installation tool. It opens a window and then tells you to
move
> > the mouse around. As you do so, a fuel guauge graphic fills pregresses.
The
> > softwar uses the manually genrated, random, hard-to-reproduce mouse xy
> > coordinates as seed data for the SSH code. This takes only about 7
seconds
> > to complete. Seems like a very neat way to create secure pascodes on the
> > fly. I hope to try a native REBOL version.
> >
> > Other approaches I have been wondering about: using small photos with
> > embedded data in them. The advantage there is an ancient humanly
readable
> > verification combined with encrypted invisble data. A hybrid woudl be to
> > generate small artworks using the mouse tracking.. in effect genreate
art to
> > craeet imagery which also embdeds encrypted data within. These could
then be
> > used as iconographic security tokens.
> >
> > ./Jason
> >
> > --
> > To unsubscribe from this list, please send an email to
> > [EMAIL PROTECTED] with "unsubscribe" in the
> > subject, without the quotes.
> >
>
>
> --
> To unsubscribe from this list, please send an email to
> [EMAIL PROTECTED] with "unsubscribe" in the
> subject, without the quotes.
>
>

-- 
To unsubscribe from this list, please send an email to
[EMAIL PROTECTED] with "unsubscribe" in the 
subject, without the quotes.

Reply via email to