At 8:18 AM -0700 10/7/03, Rich Salz wrote:
Are you validating the toolchain? (See Ken Thompson's
Turing Aware lecture on trusting trust).
With KeyKOS, we used the argument that since the assembler we were using
was written and distributed before we designed KeyKOS, it was not feasible
to include
Greetings,
In the process of trying to work around some of the limitations
of the m$-CAPI API, I'm trying to decipher the internal representation
of private keys in the default m$ key store, in order to extract
the private key out.
The systems I'm working on are Win2K and XP, both on NTFS.
Ian Grigg [EMAIL PROTECTED] writes:
I'm curious - my understanding of a VPN was that
it set up a network that all applications could
transparently communicate over.
Port forwarding appears not to be that, in
practice each application has to be reconfigured
to talk to the appropriate port,
Ian Grigg wrote:
I'm curious - my understanding of a VPN was that
it set up a network that all applications could
transparently communicate over.
spot on.
Port forwarding appears not to be that, in
practice each application has to be reconfigured
to talk to the appropriate port, or, each
Thor Lancelot Simon wrote:
On Sun, Oct 05, 2003 at 03:04:00PM +0100, Ben Laurie wrote:
Thor Lancelot Simon wrote:
On Sat, Oct 04, 2003 at 02:09:10PM +0100, Ben Laurie wrote:
Thor Lancelot Simon wrote:
these operations. For example, there is no simple way to do the most
common
Peter Clay wrote:
On Thu, 9 Oct 2003, Peter Gutmann wrote:
I would add to this the observation that rather than writing yet another SSL
library to join the eight hundred or so already out there, it might be more
useful to create a user-friendly management interface to IPsec implementations
- Original Message -
From: Peter Gutmann [EMAIL PROTECTED]
[...]
The problem is
that what we really need to be able to evaluate is how committed a vendor
is
to creating a truly secure product.
[...]
I agree 100% with what you said. Your 3 group classification seems
accurate.
But
Companies are using a new software protection system, called Fade, to
protect their intellectual property from software thieves. Fade is being
introduced by Macrovision, which specializes in digital rights management,
and the British games developer Codemasters. What the program does is make
Since I'm sure Perry will eventually get tired of VPNs, before he does I
should announce that I have, at the request of several participants in
the recent discussions, set up a list for VPN theory discussion. It is
currently unmoderated, though I reserve the option to change that if
warranted.
Anton Stiglic wrote:
- Original Message -
From: Peter Gutmann [EMAIL PROTECTED]
[...]
The problem is
that what we really need to be able to evaluate is how committed a vendor
is
to creating a truly secure product.
[...]
I agree 100% with what you said. Your 3 group
Yawn... This is no different than any of the copy protection schemes
employed in the 1980's on then popular home computers such as the
commodore 64.
Hindsight is 20/20 and recalls, all of these were broken within weeks if
not months. Nibbler copiers and other programs were quickly built that
11 matches
Mail list logo