Am Fr 16. Mai 2008 schrieb Al Johnson:
On Friday 16 May 2008, ramsesoriginal wrote:
I was just wondering: we have seen the problems of encryptingcalls.
But what about decrypting them? Let*s say someone hasa method to call
you with some sort of encryption.. would it be possible to write a
On Tuesday 20 May 2008, [EMAIL PROTECTED] wrote:
Am Fr 16. Mai 2008 schrieb Al Johnson:
On Friday 16 May 2008, ramsesoriginal wrote:
I was just wondering: we have seen the problems of encryptingcalls.
But what about decrypting them? Let*s say someone hasa method to call
you with some
ramsesoriginal wrote:
I was just wondering: we have seen the problems of encryptingcalls.
But what about decrypting them? Let*s say someone hasa method to call
you with some sort of encryption.. would it be possible to write a
decryption for it? Maybe public key?
Hi,
I guess you should look
Some time ago, I stumbled upon a device that came in pairs and connected to
the Sony Erricson T61i. It claimed that, when used on each end it encrypted
the call. I suspect that the device contained some shared secret key. I wish
I could recall the data on it, or where I saw it. If such a mediocre
I was just wondering: we have seen the problems of encryptingcalls.
But what about decrypting them? Let*s say someone hasa method to call
you with some sort of encryption.. would it be possible to write a
decryption for it? Maybe public key?
--
My corner of the web:
On Friday 16 May 2008, ramsesoriginal wrote:
I was just wondering: we have seen the problems of encryptingcalls.
But what about decrypting them? Let*s say someone hasa method to call
you with some sort of encryption.. would it be possible to write a
decryption for it? Maybe public key?
6 matches
Mail list logo