--- begin forwarded text
Date: Tue, 27 Jul 1999 22:51:23 -0400
To: [EMAIL PROTECTED]
From: "L.J.Alberts" [EMAIL PROTECTED]
Subject: IP: WHITE HOUSE PROPOSES MASSIVE COMPUTER MONITORING SYSTEM
Sender: [EMAIL PROTECTED]
Reply-To: "L.J.Alberts" [EMAIL PROTECTED]
-BEGIN PGP SIGNED
Title: Computer Monitoring System
From the N.Y. Times web site:
---
July 28, 1999
U.S. Drafting Plan for Computer Monitoring System
By JOHN MARKOFF
The Clinton Administration has developed a plan for an extensive computer monitoring system, overseen by the Federal Bureau of
At 3:22 PM -0700 7/27/99, Jon Callas wrote:
I built a PRNG that used an RC4 variant as John Kelsey said. The thing is
also actually very Yarrow-like. I modified it later to use a state array
512 long instead of 256 long, just so it would have a larger entropy pool.
When I added more entropy, I
In [EMAIL PROTECTED], on 07/27/99
at 09:17 PM, John Young [EMAIL PROTECTED] said:
use of the Internet to distribute encryption products
will render Wassenaar's controls immaterial."
The bitch is getting a clue. :)
--
---
William
[Forwarded because no one has brought up this notion in a while. My
problem with it is that most people don't seem to like the 2nd
amendment any more so this can hardly help to popularize the cause. My
feeling is that the 4th and 5th amendments have more potential
protection in them. --Perry]
John Young writes:
Nations do not control distribution of intangible items. While
I recognize that this issue is controversial, unless we address
this situation, use of the Internet to distribute encryption products
will render Wassenaar's controls immaterial."
I just love this
At 08:02 PM 7/22/99 +0200, Anonymous wrote:
That is:
1a') When there is entropy in the pool, it [/dev/urandom]
gobbles it all up before
acting like a PRNG. Leverage factor=1. This causes other applications to
stall if they need to read /dev/random.
This does not seem to be a big
At 10:49 AM -0400 7/28/99, Arnold G. Reinhold wrote:
I believe the input mechanism Anonymous described *is* the RC4 key setup
mechanism. In any case, I take Anonymous' remarks about the brittle nature
of RC4 very seriously. I wouldn't mess with it just to double the entropy
pool. If
At 2:51 PM -0400 7/28/99, Steven M. Bellovin wrote:
In message v04011701b3c4f4fbabb1@[24.218.56.100], "Arnold G. Reinhold"
writes
I'd spin it the other way. The best approach to making nonces -- DH
exponents, symetric keys, etc -- is to use a true source of randomness.
That eliminates one area
I recognize that this issue is controversial, unless we address
this situation, use of the Internet to distribute encryption products
will render Wassenaar's controls immaterial."
Gee, I thought Reinsch said it didn't matter that encryption software
was distributed on the Internet because
10 matches
Mail list logo