In message [EMAIL PROTECTED], John Denker writes:
Here's a challenge directly relevant to this group: Can you
design a comsec system so that pressure against a code clerk
will not do unbounded damage? What about pressure against a
comsec system designer?
If I understand your question correctly,
At 11:26 PM -0500 8/14/04, Bruce Schneier wrote:
Websites, Passwords, and Consumers
Criminals follow the money. Today, more and more money is on the
Internet. Millions of people manage their bank accounts, PayPal
accounts, stock portfolios, or other payment accounts online. It's a
--- begin forwarded text
To: [EMAIL PROTECTED]
Subject: RPOW - Reusable Proofs of Work
Date: Sun, 15 Aug 2004 10:43:09 -0700 (PDT)
From: [EMAIL PROTECTED] (Hal Finney)
Sender: [EMAIL PROTECTED]
I'd like to invite members of this list to try out my new
hashcash-based server, rpow.net.
This
http://www.nypost.com/business/18671.htm
The New York Post
CYBER FEARS ON FED'S WEB PLAN
By HILARY KRAMER
Email Archives
Print Reprint
August 15, 2004 -- With little fanfare, the Federal Reserve will begin
transferring the nation's money supply over an Internet-based system this
Anyone who knows about cryptography quickly comes to the conclusion that if
it's encrypted, and I have the key it's *my* property.
It doesn't matter what the lawyers say -- or even the guys they hire with
guns at your friendly local geographic force monopoly.
:-).
Now if we can figure out a way