Anne & Lynn Wheeler wrote:
Ed Gerck wrote:
Regarding PKI, the X.509 idea is not just to automate the process of
reliance but to do so without introducing vulnerabilities in the
threat model considered in the CPS.
but that is one of the points of the article that as you automate more
things y
--- begin forwarded text
Delivered-To: [EMAIL PROTECTED]
Date: Thu, 8 Dec 2005 15:59:25 -0500
To: Philodox Clips List <[EMAIL PROTECTED]>
From: "R. A. Hettinga" <[EMAIL PROTECTED]>
Subject: [Clips] Study Finds Mass Data Breaches Not as Risky as Smaller
Lapses
Reply-To: [EMAIL PROTE
--
From: Anne & Lynn Wheeler
<[EMAIL PROTECTED]>
> PKI is trying to offer some added value in first time
> communication between two strangers
However, the main point of attack is phishing, when an
outsider attempts to interpose himself, the man in the
middle, into an existin
--
James A. Donald:
> > > > We can, and should, compare any system with the
> > > > attacks that are made upon it. As a boat
> > > > should resist every probable storm, and if it
> > > > does not it is a bad boat, an encryption system
> > > > should resist every real threat, and if it doe
> I would never use online banking, and I advise all my friends and
colleagues (particularly those who _aren't_ computer-security-geeks) to
avoid it.
>
I have to say that I am puzzled by the way that this thread has unfolded.
It started off with Dan Geer:
"You know, I'd wonder how many people on
On Thu, Dec 08, 2005 at 09:40:22AM -0800, Aram Perez wrote:
> On Dec 7, 2005, at 10:24 PM, James A. Donald wrote:
>> Aram Perez
>>> James A. Donald:
We can, and should, compare any system with the
attacks that are made upon it. As a boat should
resist every probable storm, and if i
> Does anyone here have any links to voting system designs that use
> cryptography to achieve their goals?
Have a look at www.scytl.com
Neil Mitchison
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptog