On Thu, 20 Oct 2005, cyphrpunk wrote:
system without excessive complications. Only the fifth point, the
ability for outsiders to monitor the amount of cash in circulation, is
not satisfied. But even then, the ecash mint software, and procedures
and controls followed by the issuer, could be des
> http://www.cisco.com/en/US/products/hw/vpndevc/ps2284/products_configuration_guide_chapter09186a00803ee1f0.html#wp2477015
>
> - - -
>
> Cisco Client Parameters
>
> Allow Password Storage on Client - Check this box to allow IPSec
> clients to store their login passwords on thei
* Perry E. Metzger:
> Via cryptome:
>
> http://evilscientists.de/blog/?page_id=343
>
>The Cisco VPN Client uses weak encryption to store user and group
>passwords in your local profile file. I coded a little tool to
>reveal the saved passwords from a given profile file.
>
> If this is
On 10/19/05, R.A. Hettinga <[EMAIL PROTECTED]> wrote:
>
> [EDIT]
> Daugman presents
> (http://www.cl.cam.ac.uk/users/jgd1000/combine/combine.html) the two rival
> intuitions, then does the maths. On the one hand, a combination of
> different tests should improve performance, because more infor
Let's take a look at Daniel Nagy's list of desirable features for an
ecash system and see how simple, on-line Chaum ecash fares.
> http://www.epointsystem.org/~nagydani/ICETE2005.pdf
>
> One of the reasons, in the author s opinion, is that payment systems
> based on similar schemes lack some ke
RAH, et al.,
It is true that one can combine two diagnostic
tests to a worse effect than either alone, but
it is not a foredrawn conclusion. To take a
medical example, you screen first with a cheap
test that has low/no false negatives then for the
remaining positives you screen with a potentiall
Hello,
I would like to notify you all of a new mailing list forum which I
opened. It is called "Practical Security" and is aimed at discussing
security measures in the context of real problems in real projects.
It has a much narrower scope than the Cryptography mailing list and
by no means i
--- begin forwarded text
Delivered-To: [EMAIL PROTECTED]
Date: Wed, 19 Oct 2005 23:32:55 -0400
To: Philodox Clips List <[EMAIL PROTECTED]>
From: "R.A. Hettinga" <[EMAIL PROTECTED]>
Subject: [Clips] Read two biometrics, get worse results - how it works
Reply-To: [EMAIL PROTECTED]
Sender: [
--- begin forwarded text
Delivered-To: [EMAIL PROTECTED]
Date: Wed, 19 Oct 2005 23:33:54 -0400
To: Philodox Clips List <[EMAIL PROTECTED]>
From: "R.A. Hettinga" <[EMAIL PROTECTED]>
Subject: [Clips] Bruce Schneier talks cyber law
Reply-To: [EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]