Jason, another idea is to send the 'sister emails' (broken up data) over
different transportation protocols.

Enjoy!!
Ammon


----- Original Message -----
From: "Jason Cunliffe" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Tuesday, December 18, 2001 6:47 PM
Subject: [REBOL] Re: Secure file upload tool design?


> > Hi Jason,
> >
> > encryption can be achive with just core
> > but it is better not discuss it on the list
> > (per RT request)
> >
> > [EMAIL PROTECTED]
>
> Hi Tom
>
> Thanks for your reply. I am listening ...
>
> ./Jason
>
> > On Tue, 18 Dec 2001, Jason Cunliffe wrote:
> >
> > > > You could always implement encryption yourself and
> > > > send the files between REBOL client program to
> > > > REBOL server using a custom protocol. There are any
> > > > number of free sources describing cryptographic
> > > > algorithms on the web; the main problem with
> > > > implementing them in REBOL may be performance,
> > > > since REBOL isn't entirely a speed demon for
> > > > math, as I understand it.
> > >
> > > Thanks. Yes I tend to believe the easiest adn often most effective
> security
> > > is simply small customized tools designed to play together on both
> client
> > > and server. For that one can use almost anything, images, flash, rebol
> .. 6
> > > different sister emails designed to be re-assembled etc.
> > >
> > > Am I right in understanding that the cryptographic needs are only for
> > > generating codes? They do not need to run all the time? If so, REBOL's
> math
> > > crunching speed is not really an obstacle.
> > >
> > > Today I upgraded my version of F-Secures SSH-Telnet Client. They ahave
a
> > > really cool installation tool. It opens a window and then tells you to
> move
> > > the mouse around. As you do so, a fuel guauge graphic fills
pregresses.
> The
> > > softwar uses the manually genrated, random, hard-to-reproduce mouse xy
> > > coordinates as seed data for the SSH code. This takes only about 7
> seconds
> > > to complete. Seems like a very neat way to create secure pascodes on
the
> > > fly. I hope to try a native REBOL version.
> > >
> > > Other approaches I have been wondering about: using small photos with
> > > embedded data in them. The advantage there is an ancient humanly
> readable
> > > verification combined with encrypted invisble data. A hybrid woudl be
to
> > > generate small artworks using the mouse tracking.. in effect genreate
> art to
> > > craeet imagery which also embdeds encrypted data within. These could
> then be
> > > used as iconographic security tokens.
> > >
> > > ./Jason
> > >
> > > --
> > > To unsubscribe from this list, please send an email to
> > > [EMAIL PROTECTED] with "unsubscribe" in the
> > > subject, without the quotes.
> > >
> >
> >
> > --
> > To unsubscribe from this list, please send an email to
> > [EMAIL PROTECTED] with "unsubscribe" in the
> > subject, without the quotes.
> >
> >
>
> --
> To unsubscribe from this list, please send an email to
> [EMAIL PROTECTED] with "unsubscribe" in the
> subject, without the quotes.


_________________________________________________________
Do You Yahoo!?
Get your free @yahoo.com address at http://mail.yahoo.com

-- 
To unsubscribe from this list, please send an email to
[EMAIL PROTECTED] with "unsubscribe" in the 
subject, without the quotes.

Reply via email to