Enzo Michelangeli writes:
In the world of international trade, where mutual distrust between buyer
and seller is often the rule and there is no central authority to
enforce
the law, this is traditionally achieved by interposing not less than
three
trusted third parties: the shipping line,
- Original Message -
From: Ian Grigg [EMAIL PROTECTED]
To: Hal Finney [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED];
[EMAIL PROTECTED]
Sent: Sunday, November 07, 2004 11:21 AM
[Hal:]
Interesting. In the e-gold case, both parties have the same bank,
e-gold ltd. The
Yes, I'm looking at ideas like this for ecash gambling, but you have
a who-goes-first problem. One side or the other has to rip their
own cash first, and then the other side can just go away and leave the
first side screwed. The act of ripping cash is relatively atomic and
involves a
During World War II, he cracked Japanese secret codes for the Army, then
returned to puzzles.
He was a founder of the American Cryptogram Association, and in 1976
published An Annotated Bibliography of Cryptography, still used by
experts. He was a champion scrabble player, and wrote a scholarly
Here are some things that can --and do-- go wrong with the scanned ballots:
- blank votes (where the voter could have made a mark but did not) can
be voted at will after the ballot is cast by the voter, and no one can
detect the fraud.
- by looking at the vote pattern, a voter contract to vote for
http://www.technologyreview.com/articles/04/11/rnb_110804.asp?trk=nl
Technology Review
Single Field Shapes Quantum Bits
November 8, 2005
Quantum computers, which tap the properties of particles like atoms,
photons and electrons to carry out computations, could potentially use a
variety of
http://gcn.com/cgi-bin/udt/im.display.printable?client.id=gcndaily2story.id=27861
No mandate for e-voting, computer scientist says
11/09/04
By William Jackson,
GCN Staff
Despite wide use in last week's presidential election, direct-recording
electronic voting still is a faulty method of casting
http://sfgate.com/cgi-bin/article.cgi?f=/news/archive/2004/11/10/financial1831EST0118.DTL
Ths San Francisco Chronicle
Calif. settles electronic voting suit against Diebold for $2.6M
RACHEL KONRAD, AP Technology Writer
Wednesday, November 10, 2004
(11-10) 15:31 PST SAN FRANCISCO (AP) --
for sale at http://www.elcomsoft.com/prs.html#aefsdr
http://www.elcomsoft.com/prs.html#aefsdr :
A program to recover (decrypt) files encrypted on NTFS (EFS) partitions
created in Windows 2000, Windows XP and Windows Server 2003. Files are being
decrypted even in a case when the system is not
This is not as serious as I thought. According to
http://www.elcomsoft.com/AEFSDR/whatsnew.txt, the cracker would need your
password and access to your drive.
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe
http://www.washingtonpost.com/ac2/wp-dyn/A41460-2004Nov10?language=printer
The Washington Post
washingtonpost.com
E-Mail Authentication Will Not End Spam, Panelists Say
By Jonathan Krim
Washington Post Staff Writer
Thursday, November 11, 2004; Page E01
For consumers and businesses
http://www.theregister.co.uk/2004/11/11/banks_prepare_for_atm_cyber_crime/print.html
The Register
Biting the hand that feeds IT
The Register » Security » Network Security »
Original URL:
http://www.theregister.co.uk/2004/11/11/banks_prepare_for_atm_cyber_crime/
Banks brace for cashpoint
http://news.yahoo.com/news?tmpl=storycid=519u=/ap/20041112/ap_on_re_us/passenger_screening_1printer=1
Yahoo!
Gov't Orders Air Passenger Data for Test
Fri Nov 12, 2:35 PM ET
By LESLIE MILLER, Associated Press Writer
WASHINGTON - The government on Friday ordered airlines to turn over
http://www.hindustantimes.com/onlineCDA/PFVersion.jsp?article=http://10.81.141.122/news/181_1104972,0006.htm
: HindustanTimes.com
Prove identity to surf net in Bangalore
Press Trust of India
Bangalore, November 15
Advertisement
Internet surfers in over 50,000 cyber cafés across Karnataka
--- begin forwarded text
Date: Mon, 15 Nov 2004 04:48:20 -0600 (CST)
From: InfoSec News [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [ISN] Japanese Government Bans Security Researcher's Speech
Reply-To: [EMAIL PROTECTED]
List-Id: InfoSec News isn.attrition.org
List-Archive:
--- begin forwarded text
To: Bruce Tefft [EMAIL PROTECTED]
Thread-Index: AcTLBDc4vJyL80TwSZuIiwn1AOddIQACB0Zg
From: Bruce Tefft [EMAIL PROTECTED]
Mailing-List: list [EMAIL PROTECTED]; contact [EMAIL PROTECTED]
Date: Mon, 15 Nov 2004 07:13:19 -0500
Subject: [osint] A NON-DISCLOSURE AGREEMENT FOR
http://www.prnewswire.com/cgi-bin/stories.pl?ACCT=109STORY=/www/story/11-15-2004/0002456260EDATE=
Certicom First to Earn FIPS 186-2 Validation for Elliptic Curve Digital
Signature Algorithm
Validation of ECC-based algorithm another step in
--- begin forwarded text
Date: Tue, 16 Nov 2004 07:34:56 -0600 (CST)
From: InfoSec News [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [ISN] BlackBerry prickles Department of Defence spooks
Reply-To: [EMAIL PROTECTED]
List-Id: InfoSec News isn.attrition.org
List-Archive:
http://online.wsj.com/article_print/0,,SB110056759053675009,00.html
The Wall Street Journal
November 16, 2004
MONEY
'Virtual Debit Card' Aims
To Combat Online Fraud
By JENNIFER SARANOW
Staff Reporter of THE WALL STREET JOURNAL
November 16, 2004; Page D2
Consumers typically have been
http://www.eweek.com/print_article2/0,2533,a=139274,00.asp
EWeek
The Beginning of the Crypto Era
November 15, 2004
By Larry Seltzer
In a move that was totally expected, if a little early, Yahoo has
announced that it will put its money where its mouth is and start checking
Yahoo Mail with
--- begin forwarded text
Date: Wed, 17 Nov 2004 05:47:53 +0530
From: Suresh Ramasubramanian [EMAIL PROTECTED]
To: Deepak Jain [EMAIL PROTECTED]
Cc: NANOG [EMAIL PROTECTED]
Subject: Re: India to tax / levy license fees on ISPs that offer VPNs
Organization: Outblaze Limited -
From: David McCullough [EMAIL PROTECTED]
Subject: OCF port to linux
To: [EMAIL PROTECTED]
Date: Wed, 17 Nov 2004 17:51:31 +1000
Hi all,
Just thought I drop a line to see if anyone is interested in a linux
port of the FreeBSD(OpenBSD) Open Cryptographic Framework (OCF) ?
I needed user crypto
Guys,
Bruce and I have a new result on hash function security, which uses Joux'
multicollision trick in a neat way to allow long-message second preimage
attacks. We've posted it to the e-print server.
The basic result is that for any n-bit hash function built along the lines of
SHA1 or
http://www.technologyreview.com/articles/04/11/wo_kushner111804.asp?p=0
Technology Review
Just Another Chip in the (Privacy) Wall
An electronic database implanted under the skin can assure speedy and
proper medical care-but is it worth it?
By David Kushner
November 18, 2004
You can
24 matches
Mail list logo