At 2:29 PM -0800 12/3/05, John Gilmore wrote:
...how many people on this list use or have used online banking?
To start the ball rolling, I have not and won't.
Dan, that makes two of us.
The only thing I ever use it for is to make sure the wires are in before I
spend money. :-)
Cheers,
RAH
On 12/3/05, Victor Duchovni [EMAIL PROTECTED] wrote:
Actually, this is inaccurate, proving the strength of AES or factoring is
difficult, and may never happen, we may even prove AES to be not secure
(in a broad sense) some day. Proving an RNG secure is *impossible*.
I'm not sure it's
I'm dissatisfied with the state of /dev/random devices on Unix. Here
are my gripes:
So far I haven't seen any userland tools for updating the entropy count.
This is unfortunate, because sometimes I generate entropy on one machine
and want to pipe it into the /dev/random pool.
However, I cannot
dan, maybe you should just keep less money in the bank.
i use online banking and financial services of almost every kind
(except bill presentment, because i like paper bills). i ccannot do
without it.
it seems to me the question is how much liability do i expose myself to by
doing this, in
[EMAIL PROTECTED] wrote:
You know, I'd wonder how many people on this
list use or have used online banking.
To start the ball rolling, I have not and won't.
--dan
I do.
My bank provides an RSA SecureId, so I feel reasonably safe against
anyone other than the bank. I have no basis for
[EMAIL PROTECTED] wrote:
You know, I'd wonder how many people on this
list use or have used online banking.
To start the ball rolling, I have not and won't.
I have not! I declined the chance when my
bank told me that I had to download their
special client that only runs on windows...
| You know, I'd wonder how many people on this
| list use or have used online banking.
|
| To start the ball rolling, I have not and won't.
Until a couple of months ago, I avoided doing anything of this sort at all.
Simple reasoning: If I know I never do any financial stuff on-line, I can
- Original Message -
From: Sidney Markowitz [EMAIL PROTECTED]
Subject: Re: Fermat's primality test vs. Miller-Rabin
Joseph Ashwood wrote:
byte [] rawBytes = new byte[lenNum/8];
rand.nextBytes(rawBytes);
curNum = new BigInteger(rawBytes);
curNum = BigInteger.ONE.or(new
Um, what's Data Security?
;-)
Cheers,
RAH
---
--- begin forwarded text
Delivered-To: [EMAIL PROTECTED]
Date: Sun, 4 Dec 2005 19:10:25 -0500
To: Philodox Clips List [EMAIL PROTECTED]
From: R. A. Hettinga [EMAIL PROTECTED]
Subject: [Clips]
Call for IFCA Conference Sponsors, Financial
On Sat, Dec 03, 2005 at 10:47:52PM -0600, Travis H. wrote:
On 12/3/05, Victor Duchovni [EMAIL PROTECTED] wrote:
Actually, this is inaccurate, proving the strength of AES or factoring is
difficult, and may never happen, we may even prove AES to be not secure
(in a broad sense) some day.
At 10:54 PM -0600 12/3/05, Travis H. wrote:
I'm dissatisfied with the state of /dev/random devices on Unix.
Depends on what you mean by Unix. FreeBSD 5 and 6 have much of what you want.
So far I haven't seen any userland tools for updating the entropy count.
From 'man 4 random':
If
So far I haven't seen any userland tools for updating the entropy count.
This is unfortunate, because sometimes I generate entropy on one machine
and want to pipe it into the /dev/random pool.
However, I cannot update entropy counts [...]
This is a security feature. If non-root programs could
12 matches
Mail list logo