At 03:15 PM 6/8/04 -0400, Tyler Durden wrote:
>Well, it's interesting to consider how/if that might be possible. SONET
>scrambles the payload prior to transmission..adding an additional
crypto
>layer prior to transmission would mean changing the line rate, so
probably a
>no-no.
Tyler, one can imp
Yo Variola! Did you notice the date stamp on that post?
Did you do a stint on "Survivor" or something?
Or as I said to the short-lived Tom Veil, "What, no Starbucks near your
Unabomber shack?"
-TD
From: "Major Variola (ret)" <[EMAIL PROTECTED]>
To: "[EMAIL PROTECTED]" <[EMAIL PROTECTED]>
cyphrpunk wrote:
The main threat to
this illegal but widely practiced activity is legal action by
copyright holders against individual traders. The only effective
protection against these threats is the barrier that could be provided
by anonymity. An effective, anonymous file sharing network woul
Part of the problem is using a packet-switched network; if we had
circuit-based, then thwarting traffic analysis is easy; you just fill
the link with random garbage when not transmitting packets. I
considered doing this with SLIP back before broadband (back when my
friend was my ISP). There are t
>From: "R.A. Hettinga" <[EMAIL PROTECTED]>
>Sent: Oct 25, 2005 8:34 AM
>To: cryptography@metzdowd.com, [EMAIL PROTECTED]
>Subject: On the orthogonality of anonymity to current market demand
..
>That is to say, your analysis conflicts with the whole trend towards
>T-0 trading, execution, clearing a
On Mon, 24 Oct 2005, cyphrpunk wrote:
> Is it possible that Skype doesn't use RSA encryption? Or if they do,
> do they do it without using any padding, and is that safe?
You may want to read the report itself:
http://www.skype.com/security/files/2005-031%20security%20evaluation.pdf
an
--- "Travis H." <[EMAIL PROTECTED]> wrote:
[snip]
> Another issue involves the ease of use when switching between a
> [slower] anonymous service and a fast non-anonymous service. I have
> a
> tool called metaprox on my website (see URL in sig) that allows you
> to
> choose what proxies you use on
> If you have
> to be that confident in your computer security to use the payment
> system, it's not going to have many clients.
Maybe the trusted computing platform (palladium) may have something to
offer after all, namely enabling naive users to use services that
require confidence in their own
Is it possible that Skype doesn't use RSA encryption? Or if they do, do
they do it without using any padding, and is that safe?
No ,Skype use RSA encryption:
"Each party contributes 128 random bits toward the 256-bit session key.
The contributions are exchanged as RSA cryptograms. The two
contri
John Kelsey wrote:
From: cyphrpunk <[EMAIL PROTECTED]>
Digital wallets will require real security in user PCs. Still I don't
see why we don't already have this problem with online banking and
similar financial services. Couldn't a virus today steal people's
passwords and command their banks to tr
I'm one of those that believes that agrees with Louis Brandice's dissenting
opinion about the constitutionality of wiretaps. That they violate the
privacy of those parties who call or are called by the party being wiretapped.
I have written on this in 2002/2003. There seem to be at least two l
On 2005-10-26T08:21:08+0200, Stephan Neuhaus wrote:
> cyphrpunk wrote:
> > The main threat to
> > this illegal but widely practiced activity is legal action by
> > copyright holders against individual traders. The only effective
> > protection against these threats is the barrier that could be prov
On Wed, 26 Oct 2005, JЖrn Schmidt wrote:
> --- "Travis H." <[EMAIL PROTECTED]> wrote:
>
> [snip]
> > Another issue involves the ease of use when switching between a
> > [slower] anonymous service and a fast non-anonymous service. I
> > have a tool called metaprox on my website (see URL in sig) th
--
Steve Schear <[EMAIL PROTECTED]>
> Yes, but unfortunately it is not clear at all that
> courts would find the opposite, either. If a lawsuit
> names the currency issuer as a defendant, which it
> almost certainly would, a judge might order the
> issuer's finances frozen or impose other meas
--
John Kelsey
> What's with the heat-death nonsense? Physical bearer
> instruments imply stout locks and vaults and alarm
> systems and armed guards and all the rest, all the way
> down to infrastructure like police forces and armies
> (private or public) to avoid having the biggest gang
> en
Travis H. wrote:
Part of the problem is using a packet-switched network; if we had
circuit-based, then thwarting traffic analysis is easy; you just fill
the link with random garbage when not transmitting packets.
OK so far ...
There are two problems with this; one, getting
enough random
Hello,
At 25/10/05 07:18, cyphrpunk wrote:
> http://www.hbarel.com/Blog/entry0006.html
>
> I believe that for anonymity and pseudonymity technologies to survive
> they have to be applied to applications that require them by design,
> rather than to mass-market applications that can also do (
17 matches
Mail list logo