or vulnerabiility
check, or who can cite NIST security standard (although those
skills woul dcome in handy too!).
i talked to them. the downside is that they want this
security architect to be the security administrator,
once the system is built...
- don davis
don't know whether he's more of a free agent.
- don davis, boston
To: [EMAIL PROTECTED]
From: Arnold G. Reinhold [EMAIL PROTECTED]
Subject: [Mac_crypto] Apple should use SHA! (or stronger) to authenticate
software
releases
Sender: [EMAIL PROTECTED]
Reply
to
trust Alice's server cert for SSL connections,
except to tell MSIE 5 to trust Alice's CA.)
in NS 4.75: Communicator Tools Security Info
Certificates {Signers, Web Sites}
- don davis, boston
.
- don davis, boston
-
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
an opportunity as a wake-up
call.
- don davis
-
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
was grassing to informants...?
with similar import, here's cringely's article on
insecure CALEA workstations:
- don davis
http://www.pbs.org/cringely/pulpit/pulpit20030710.html
Not only can the authorities listen to your phone calls,
they can follow
does anyone know anything about AP's claim that Google
encrypts credit-card numbers? specifically, which
cipher and what kind of key management do they use?
- don davis, boston
-
From: Google puts new