another facet of The Administration's We Hear You efforts..
Wrong Direction on Privacy
Susan Landau
2-Aug-2010
http://www.huffingtonpost.com/susan-landau/wrong-direction-on-privac_b_666915.html
The White House wants to make it easier for the FBI to get at your email and
web browsing records;
appear to have (yet) the experimental results you're curious
about.
=JeffH
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com
-tls-snapstart
Note that the motivation for draft-agl-tls-nextprotoneg is so-called
websockets, which are being worked on in the IETF HYBI (hypertext
bidirectional) WG http://datatracker.ietf.org/wg/hybi/
=JeffH
Internet SSL Survey 2010 is here! (blog post)
http://blog.ivanristic.com/2010/07/internet-ssl-survey-2010-is-here.html
Actual report:
Qualys Internet SSL Survey 2010 v1.6 (PDF, 3.2 MB)
http://blog.ivanristic.com/Qualys_SSL_Labs-State_of_SSL_2010-v1.6.pdf
=JeffH
of possible (topical) interest...
Stanford EE Computer Systems Colloquium
4:15PM, Wednesday, May 13, 2009
HP Auditorium, Gates Computer Science Building B01
http://ee380.stanford.edu[1]
Topic:Accelerating computation with FPGAs
apropos to the biometrics essay in the Jan 2009 crypto-gram:
Researchers Hack Biometric Faces
slashdot.org/palm/18/09/02/17/216216_1.shtml
from the face-off dept. posted by kdawson on 2009-02-18 01:35:00
yahoi sends in news from a week or so back: Vietnamese researchers have
cracked the
From:Adam Barth [EMAIL PROTECTED]
Subject: TOMORROW 3 Jun - Hongxia Jin - Traitor Tracing for Anonymous Attack in
AACS Content Protection
To: [EMAIL PROTECTED]
Date:Mon, 02 Jun 2008 18:48:48 -0700
Title: Traitor Tracing for Anonymous Attack in AACS Content Protection
From:David Farber [EMAIL PROTECTED]
Subject: [IP] Cold Boot Attacks on Disk Encryption -- report on
To: ip [EMAIL PROTECTED]
Date:Thu, 21 Feb 2008 16:25:43 -0500
Begin forwarded message:
From: Declan McCullagh [EMAIL PROTECTED]
Date: February 21, 2008 3:57:43 PM EST
To: [EMAIL
again,
=JeffH
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
compliance-wise, but that's a different issue]
thanks,
=JeffH
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
From:[EMAIL PROTECTED] (Dewayne Hendricks)
Subject: [Dewayne-Net] Encrypted laptop poses legal dilemma
To: Dewayne-Net Technology List [EMAIL PROTECTED]
Date:Thu, 07 Feb 2008 15:38:22 -0800
[Note: This item comes from reader Randall. DLH]
From: Randall [EMAIL PROTECTED]
Date:
are looking at.
agreed, thanks again.
=JeffH
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
Ok thanks, I'm going to risk pedanticism in order to nail things down a bit
more rigorously..
' =JeffH ' [EMAIL PROTECTED] writes:
[EMAIL PROTECTED] said:
http://www.xml-dev.com/blog/index.php?action=viewtopicid=196
thanks, but that doesn't actually answer my first question. It only documents
said private key from
time to time?
thanks again,
=JeffH
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
not change, then there is no
additional leakage of the private key beyond what Eve can compute anyway.
ok, gotcha.
thanks again,
=JeffH
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL
4B1448BFDFAF18828EFD2519F14E45E3826634AF1949E5B535CC829A483B8A76223E5D490A257F0
5BDFF16F2FB22C583AB
=JeffH
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
again,
=JeffH
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
Oh, yeah, sorry, your diagram (or whoever drew it) does in fact answer my
second question wrt what one needs to send over the wire wrt a simplistic DH
profile. Just g, p, and a public key (y).
thanks again,
=JeffH
}
(group parameter validation), is there any reason to send q ?
thanks,
=JeffH
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
independent contactless card e-money scheme called sQuid (UK)
squidcard.com
From:Peter Tomlinson [EMAIL PROTECTED]
Subject: Re: Fwd: ID Stronghold
To: [EMAIL PROTECTED]
Date:Mon, 28 Jan 2008 16:02:51 +
Roland Perry wrote:
In article [EMAIL PROTECTED], Peter Tomlinson
[EMAIL
of possible relevance...
Mike Just. Designing and Evaluating Challenge-Question Systems. IEEE
SECURITY PRIVACY, 1540-7993/04, SEPTEMBER/OCTOBER 2004.
=JeffH
-
The Cryptography Mailing List
Unsubscribe by sending
Storm, Nugache lead dangerous new botnet barrage
By Dennis Fisher, Executive Editor
19 Dec 2007 | SearchSecurity.com
http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1286808
,00.html?track=NL-358ad=614777asrc=EM_NLN_2785475uid=1408222
In early 2006, Dave Dittrich, a senior
2008: The year of hack the vote?
http://blogs.zdnet.com/security/?p=753
December 17th, 2007
Posted by Larry Dignan @ 2:12 am
The state of Ohio has released a comprehensive study of voting machine
security and the report will have you longing for paper.
A 334-page PDF report
Of possible interest...
=JeffH
Ross Anderson: Searching For Evil
http://youtube.com/watch?v=7WlHhZUayUw
Google Tech Talks
August 23, 2007
ABSTRACT
Computer security has recently imported a lot of ideas from economics,
psychology and sociology, leading to fresh insights and new tools. I
BP being Bletchley Park of course.
http://www.bletchleypark.org.uk/
=JeffH
From: David Hansen [EMAIL PROTECTED]
Subject: Colossus in action
To: [EMAIL PROTECTED]
Organization: Spidacom Limited
Just in case anyone is as ill informed as me, I was delighted to read
at http://news.bbc.co.uk/1/hi
/~pgut001/pubs/xmlsec.txt.
As the report described below indicates, there's an effort emerging to charter
a W3C working group to rev the xmldsig spec, which might be of interest to
various folk.
=JeffH
Original Message
Subject: Report on Workshop on Next Steps for XML Signature
. To the best of my knowledge, it will be
the first publicly released estimates of the size of the network with actual
supporting data and evidence.
are your slides now available?
=JeffH
-
The Cryptography Mailing List
to believe that there's folks working hard on this given the
down-the-road risks, and are just keeping the info close to their collective
chest.
=JeffH
[0] http://blogs.technet.com/antimalware/archive/2007/09/20/storm-drain.aspx
[1] http://www.secureworks.com/media/press_releases/20070802-botstorm
28 matches
Mail list logo