Erwann ABALEA [EMAIL PROTECTED] writes:
On Fri, 25 Mar 2005, Florian Weimer wrote:
* Adam Back:
Does anyone have info on the cost of sub-ordinate CA cert with a name
space constraint (limited to issue certs on domains which are
sub-domains of a your choice... ie only valid to issue certs on
--
In my blog http://blog.jim.com/ I post how email
encryption should work
I would appreciate some analysis of this proposal, which
I think summarizes a great deal of discussion that I
have read.
* The user should automagically get his certified
key when he sets up the email
Hi James,
I read that last night, and was still musing on it...
James A. Donald wrote:
--
In my blog http://blog.jim.com/ I post how email
encryption should work
I would appreciate some analysis of this proposal, which
I think summarizes a great deal of discussion that I
have read.
*
Dan Kaminsky wrote:
Have you looked at their scheme?
http://www.securescience.net/ciphers/csc2/
Secure Science is basically publishing a cipher suite implemented by
Tom St. Denis, author of Libtomcrypt.
Aha! I seem to recall on this very list about
2 years back, Tom got crucified for trying
http://news.bbc.co.uk/2/low/technology/4380189.stm
The BBC
Tuesday, 29 March, 2005, 08:17 GMT 09:17 UK
Net fingerprints combat attacks Eighty large net service firms have
switched on software to spot and stop net attacks automatically.
The system creates digital fingerprints of ongoing