If you sign the revocation certificate in the compromised key, then
the only way it can get revoked is if the owner of the key revokes it
or it's been compromised...
_MelloN_
Ray Dillinger wrote:
On Tue, 5 Sep 2000, David Honig wrote:
The more hard-core distribute keys to previously known
parties on physical media, only.
I have long felt that PGP missed a trick when it didn't have
automatic expiry for keys -- It should be possible to build
into each
Ed replied to me,
[EMAIL PROTECTED] wrote:
Ed says,
The solution is to use a multifold of links, arranged in time and
space
such that rather than making the impossible assumption that "no part
will fail at any time," we can design a system where up to M parts
can
fail at any
According to the Daily Telegraph, the US took most of the credit for
breaking Japanese codes during WWII. The paper says that Bletchley
Park deserves more credit according to recently declassified papers.
Only traditional British reticence kept them from claiming credit
before.
I'm still far from convinced that the Web of Trust achieves what it's
supposed to achieve, even when used correctly.
Consider this question: what do you need to know about a person in
order to feel confident that they are the intended recipient of your
secure communication? Because I bet the
RSA Security has released the RSA patent into the public domain two
weeks early, apparently in a successful attempt to generate publicity.
http://www.rsasecurity.com/news/pr/000906-1.html
They're also giving away neat RSA algorithm T-Shirts and have a FAQ
about the patent expiry.
On Fri, 1 Sep 2000 15:06:52 +0300 [EMAIL PROTECTED] writes:
Ed says,
The solution is to use a multifold of links, arranged in time and space
such that rather than making the impossible assumption that "no part
will fail at any time," we can design a system where up to M parts can
fail
On Tue, 5 Sep 2000, Ted Lemon wrote:
If you sign the revocation certificate in the compromised key, then
the only way it can get revoked is if the owner of the key revokes it
or it's been compromised...
_MelloN_
This is true, and that's a *sufficient* condition
At 10:47 PM 9/5/00 -0400, Dan Geer wrote:
I can tell people never to accept
an executable mailed to them from anywhere, which will get
laughed at by all the people in the business world who...
[...who are digging their own graves if they routinely run programs
mailed to them, whether or not
Peter Wayner wrote:
According to the Daily Telegraph, the US took most of the credit for
breaking Japanese codes during WWII.
snip
If I recall correctly, the Americans were successful in breaking the
Japanese diplomatic cipher 'Purple'. This gave them some indication that
something was up in
Researchers refuse Carnivore review
By Will Rodger, USATODAY.com
Five groups of researchers have bowed out of the
competition to evaluate the so-called Carnivore Internet
surveillance system. And that likely will dash Justice
Department hopes that a major university would validate
its
RFC2440 (OpenPGP) provides for referral revocations -- you can let
other people revoke your key on your behalf.
-derek
Ray Dillinger [EMAIL PROTECTED] writes:
On Tue, 5 Sep 2000, Ted Lemon wrote:
If you sign the revocation certificate in the compromised key, then
the only way it can get
Ray Dillinger [EMAIL PROTECTED] writes:
I have long felt that PGP missed a trick when it didn't have
automatic expiry for keys -- It should be possible to build
into each key an expiration date, fixed at the time of its
creation. For shorter keys, it ought to default to expiring
-BEGIN PGP SIGNED MESSAGE-
The Members of
The Digital Commerce Society of Boston,
Rent this Space* :-),
and
The Internet Bearer Underwriting Corporation
In Celebration of the
On Wed, Sep 06, 2000 at 09:36:32AM -0700, Bill Stewart wrote:
When will we see the first RSAREF-compatible public-domain code?
'BSAFEeay', a BSAFE API layer on top of SSLeay's crypto lib, was
put up on the net about three years ago. It was mostly complete.
I beleive that RSAREF is the same
[ I was at the beach, catching up now ]
It is a test of will and power. Kaplan took offense at the widespread
attitude that such an act was beyond the power of a judge, that judges not
only should not censor thei internet, but that they *could* not censor the
internet, that the
At 4:38 PM -0700 9/5/2000, David Honig wrote:
At 05:33 PM 9/3/00 -0400, Dan Geer wrote:
How do they exchange public keys? Via email I'll bet.
Note that it is trivial(*) to construct a self-decrypting
archive and mail it in the form of an attachment. The
recipient will merely have to
Wednesday September 6, 8:03 am Eastern Time
Press Release
SOURCE: RSA Security Inc.
RSA Security Releases RSA Encryption Algorithm into Public Domain
'c = m(e) mod n' Made Available Two Weeks Early
BEDFORD, Mass., Sept. 6 /PRNewswire/ -- RSA® Security
Inc. (Nasdaq: RSAS - news) today
18 matches
Mail list logo