Re: AMDs new instructions for parallelism and support för side-channel attacks?

2007-08-20 Thread pgut001
=?UTF-8?B?Sm9hY2hpbSBTdHLDtm1iZXJnc29u?= [EMAIL PROTECTED] writes: I just saw om EE Times that AMD will start to extend their x86 CPUs with instructions to support/help developers take advantage of the increasing (potential) parallelism in their processors. First out are two instructions that

Re: New DoD encryption mandate

2007-08-20 Thread Jack Lloyd
On Fri, Aug 17, 2007 at 05:21:16PM -0700, Alex Alten wrote: Agreed, for most requirements. Sometimes one may need to keep keys in trusted hardware only. The only real fly-in-the-ointment is that current hash algorithms (SHA-1, SHA-2, etc.) don't scale across multiple CPU cores (assuming you

RE: Skype new IT protection measure

2007-08-20 Thread Peter Thermos
Interesting comment from Skype: The disruption was triggered by a massive restart of our users' computers across the globe within a very short timeframe as they re-booted after receiving a routine set of patches through Windows Update. and We can confirm categorically that no malicious

more reports of terrorist steganography

2007-08-20 Thread Steven M. Bellovin
http://www.esecurityplanet.com/prevention/article.php/3694711 I'd sure like technical details... --Steve Bellovin, http://www.cs.columbia.edu/~smb - The Cryptography Mailing List Unsubscribe by sending

Re: Skype new IT protection measure

2007-08-20 Thread Thor Lancelot Simon
On Mon, Aug 20, 2007 at 11:42:39AM -0400, Peter Thermos wrote: We can confirm categorically that no malicious activities were attributed or that our users' security was not, at any point, at risk. One wonders if it was their attorneys who suggested that they confirm categorically that x OR y

interesting paper on the economics of security

2007-08-20 Thread Steven M. Bellovin
http://www.cl.cam.ac.uk/~rja14/Papers/econ_crypto.pdf --Steve Bellovin, http://www.cs.columbia.edu/~smb - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

Re: more reports of terrorist steganography

2007-08-20 Thread Jim Youll
That's a pretty in-credible report. Emphasis on in-. It's disturbing to see Security Researchers so willing to trade on rumors in order to be quoted in the press. The conclusion is pretty confusing. Conclusion Internet-based attacks are extremely popular with terrorist organizations

RE: more reports of terrorist steganography

2007-08-20 Thread Dave Korn
On 20 August 2007 16:00, Steven M. Bellovin wrote: http://www.esecurityplanet.com/prevention/article.php/3694711 I'd sure like technical details... Well, how about 'it can't possibly work [well]'? [ ... ] The article provides a detailed example of how 20 messages can be hidden in a 100

Re: more reports of terrorist steganography

2007-08-20 Thread sjk
Dave Korn wrote: That's gotta stand out like a statistical sore thumb. The article is pretty poor if you ask me. It outlines three techniques for stealth: steganography, using a shared email account as a dead-letter box, and blocking or redirecting known IP addresses from a mail