Greetings:
Here is a brief update on the open source version of the WiKID Strong
Authentication System:
* New PHP network client released
* SugarCRM network client released (based on PHP network client)
* Citrix Web Interface network client released
* Java token client binary released
* Minor
. On Sep 30, 2005, at 8:48 PM, R.A. Hettinga wrote:
Schwarzenegger signs law to punish phishing
Uhh... how is this to be enforced? I assume that the law states that
the perpetrators will be charged, not the companies that are phished.
Concrete example may clarify:
Someone purporting
I just heard that the Venona intercepts haven't all been decrypted, and
that the reason for that was there wasn't enough budget to do so.
Is that not enough budget to apply the one-time pads they already have,
or is that the once-and-futile exercise of decrypting ciphertext with no
one-time pad
I'm a bit concerned by this scheme. I'm not clear at the moment whether
you're proposing imposing it on all wikipedia users or just those that
want to access via Tor?
On Mon, Oct 03, 2005 at 11:48:48AM +, Jason Holt wrote:
* Lack of forward secrecy is indeed an issue, since our metaphorical
At 16:20 2005-10-03 -0400, R.A. Hettinga wrote:
I just heard that the Venona intercepts haven't all been decrypted, and
that the reason for that was there wasn't enough budget to do so.
Is that not enough budget to apply the one-time pads they already have,
or is that the once-and-futile
On 10/3/05, Jason Holt [EMAIL PROTECTED] wrote:
More thoughts regarding the tokens vs. certs decision, and also multi-use:
This is a good summary of the issues. With regard to turning client
certs on and off: from many years of experience with anonymous and
pseudonymous communication, the big