At 8:17 AM -0800 on 11/4/99, [EMAIL PROTECTED] wrote:
> Date: Fri, 22 Oct 1999 15:51:57 -0400
> From: "Jeffrey M. Voas" <[EMAIL PROTECTED]>
> Subject: Call for papers, Malicious Information Technology
>
> Co-Authored:
>
> Software Assessment: Reliability, Safety, and Testability (Wiley, 1995)
>
This was sent to several individuals and five mailing lists. Is that necessary?
I've cut reply down to two lists.
Marc Horowitz wrote:
>
> For most attackers and most secrets, more traditional techniques like
> blackmail and torture are likely to be cheaper and easier than the
> attacks below.
At 9:32 AM -0700 on 11/5/99, NewsScan wrote:
> THE TRUTH ABOUT ENCRYPTION
> Cambridge University cryptography expert Ross Anderson says governments'
> efforts to keep encryption technology out of the hands of criminals and
> terrorists is misguided: "If I were to hold a three-hour encrypted
> co