Re: X.509 / PKI, PGP, and IBE Secure Email Technologies

2005-12-09 Thread Ed Gerck
Anne & Lynn Wheeler wrote: Ed Gerck wrote: Regarding PKI, the X.509 idea is not just to automate the process of reliance but to do so without introducing vulnerabilities in the threat model considered in the CPS. but that is one of the points of the article that as you automate more things y

[Clips] Study Finds Mass Data Breaches Not as Risky as Smaller Lapses

2005-12-09 Thread R. A. Hettinga
--- begin forwarded text Delivered-To: [EMAIL PROTECTED] Date: Thu, 8 Dec 2005 15:59:25 -0500 To: Philodox Clips List <[EMAIL PROTECTED]> From: "R. A. Hettinga" <[EMAIL PROTECTED]> Subject: [Clips] Study Finds Mass Data Breaches Not as Risky as Smaller Lapses Reply-To: [EMAIL PROTE

Re: X.509 / PKI, PGP, and IBE Secure Email Technologies

2005-12-09 Thread James A. Donald
-- From: Anne & Lynn Wheeler <[EMAIL PROTECTED]> > PKI is trying to offer some added value in first time > communication between two strangers However, the main point of attack is phishing, when an outsider attempts to interpose himself, the man in the middle, into an existin

Re: X.509 / PKI, PGP, and IBE Secure Email Technologies

2005-12-09 Thread James A. Donald
-- James A. Donald: > > > > We can, and should, compare any system with the > > > > attacks that are made upon it. As a boat > > > > should resist every probable storm, and if it > > > > does not it is a bad boat, an encryption system > > > > should resist every real threat, and if it doe

Re: [spam]::Re: [Clips] Banks Seek Better Online-Security Tools

2005-12-09 Thread Jason Axley
> I would never use online banking, and I advise all my friends and colleagues (particularly those who _aren't_ computer-security-geeks) to avoid it. > I have to say that I am puzzled by the way that this thread has unfolded. It started off with Dan Geer: "You know, I'd wonder how many people on

Re: X.509 / PKI, PGP, and IBE Secure Email Technologies

2005-12-09 Thread Matthew Byng-Maddick
On Thu, Dec 08, 2005 at 09:40:22AM -0800, Aram Perez wrote: > On Dec 7, 2005, at 10:24 PM, James A. Donald wrote: >> Aram Perez >>> James A. Donald: We can, and should, compare any system with the attacks that are made upon it. As a boat should resist every probable storm, and if i

RE: [Clips] Diebold insider alleges company plagued by technical woes

2005-12-09 Thread Neil Mitchison
> Does anyone here have any links to voting system designs that use > cryptography to achieve their goals? Have a look at www.scytl.com Neil Mitchison - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptog