On Sun, Nov 08, 2009 at 01:08:54PM -0500, Perry E. Metzger wrote:
I'll point out that in the midst of several current discussions, the
news of the TLS protocol bug has gone almost unnoticed, even though it
is by far the most interesting news of recent months.
Not entirely unnoticed:
On 11/08/2009 02:07 AM, John Levine wrote:
At a meeting a few weeks ago I was talking to a guy from BITS, the
e-commerce part of the Financial Services Roundtable, about the way
that malware infected PCs break all banks' fancy multi-password logins
since no matter how complex the login process,
Jerry Leichter wrote:
On Nov 8, 2009, at 2:07 AM, John Levine wrote:
At a meeting a few weeks ago I was talking to a guy from BITS, the
e-commerce part of the Financial Services Roundtable, about the way
that malware infected PCs break all banks' fancy multi-password logins
since no matter
On Nov 8, 2009, at 7:45 PM, Thorsten Holz wrote:
...There are several approaches to stop (or at least make it more
difficult) this attack vector. A prototype of a system that
implements the techniques described in your blog posting was
presented by IBM Zurich about a year ago, see
On Nov 9, 2009, at 9:25 AM, mhey...@gmail.com mhey...@gmail.com
wrote:
From http://www.youtube.com/watch?v=zE5PGeh2K9k
Unlock your door with a secret knock.
Prior to watching the video I said to myself, Great, now I can break
into most of the homes on my block with 'Shave and a
Perry E. Metzger wrote:
I'll point out that in the midst of several current discussions, the
news of the TLS protocol bug has gone almost unnoticed, even though it
is by far the most interesting news of recent months.
Perhaps because there have been so many false alarms over the years.