Re: Security Architect Position at National Archives

2004-05-08 Thread Don Davis
or vulnerabiility check, or who can cite NIST security standard (although those skills woul dcome in handy too!). i talked to them. the downside is that they want this security architect to be the security administrator, once the system is built... - don davis

Re: [Mac_crypto] Apple should use SHA! (or stronger) to authenticate software releases

2004-04-04 Thread Don Davis
don't know whether he's more of a free agent. - don davis, boston To: [EMAIL PROTECTED] From: Arnold G. Reinhold [EMAIL PROTECTED] Subject: [Mac_crypto] Apple should use SHA! (or stronger) to authenticate software releases Sender: [EMAIL PROTECTED] Reply

RE: Monoculture

2003-10-02 Thread Don Davis
to trust Alice's server cert for SSL connections, except to tell MSIE 5 to trust Alice's CA.) in NS 4.75: Communicator Tools Security Info Certificates {Signers, Web Sites} - don davis, boston

Re: Monoculture

2003-10-01 Thread Don Davis
. - don davis, boston - - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

Re: Monoculture

2003-10-01 Thread Don Davis
an opportunity as a wake-up call. - don davis - - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

Re: traffic analysis of phone calls?

2003-07-12 Thread Don Davis
was grassing to informants...? with similar import, here's cringely's article on insecure CALEA workstations: - don davis http://www.pbs.org/cringely/pulpit/pulpit20030710.html Not only can the authorities listen to your phone calls, they can follow

google crypto?

2003-06-29 Thread Don Davis
does anyone know anything about AP's claim that Google encrypts credit-card numbers? specifically, which cipher and what kind of key management do they use? - don davis, boston - From: Google puts new