=?UTF-8?B?Sm9hY2hpbSBTdHLDtm1iZXJnc29u?= [EMAIL PROTECTED] writes:
I just saw om EE Times that AMD will start to extend their x86 CPUs with
instructions to support/help developers take advantage of the increasing
(potential) parallelism in their processors. First out are two instructions
that
On Fri, Aug 17, 2007 at 05:21:16PM -0700, Alex Alten wrote:
Agreed, for most requirements. Sometimes one may need to keep keys
in trusted hardware only. The only real fly-in-the-ointment is that current
hash algorithms (SHA-1, SHA-2, etc.) don't scale across multiple CPU
cores (assuming you
Interesting comment from Skype:
The disruption was triggered by a massive restart of our users' computers
across the globe within a very short timeframe as they re-booted after
receiving a routine set of patches through Windows Update.
and
We can confirm categorically that no malicious
http://www.esecurityplanet.com/prevention/article.php/3694711
I'd sure like technical details...
--Steve Bellovin, http://www.cs.columbia.edu/~smb
-
The Cryptography Mailing List
Unsubscribe by sending
On Mon, Aug 20, 2007 at 11:42:39AM -0400, Peter Thermos wrote:
We can confirm categorically that no malicious activities were attributed
or that our users' security was not, at any point, at risk.
One wonders if it was their attorneys who suggested that they confirm
categorically that x OR y
http://www.cl.cam.ac.uk/~rja14/Papers/econ_crypto.pdf
--Steve Bellovin, http://www.cs.columbia.edu/~smb
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]
That's a pretty in-credible report.
Emphasis on in-.
It's disturbing to see Security Researchers so willing to trade on
rumors in order to be quoted in the press.
The conclusion is pretty confusing.
Conclusion
Internet-based attacks are extremely popular with terrorist
organizations
On 20 August 2007 16:00, Steven M. Bellovin wrote:
http://www.esecurityplanet.com/prevention/article.php/3694711
I'd sure like technical details...
Well, how about 'it can't possibly work [well]'?
[ ... ] The article provides a detailed example of how 20 messages can be
hidden in a 100
Dave Korn wrote:
That's gotta stand out like a statistical sore thumb.
The article is pretty poor if you ask me. It outlines three techniques for
stealth: steganography, using a shared email account as a dead-letter box, and
blocking or redirecting known IP addresses from a mail