Hi,
>> There is a host of older literature, too - P2P research, however, has become
>> a cold topic. Although I expect that it will see a revival in the face of
>> surveillance.
>
> For people who are interested, the list I have (for a year or two back) is:
[list]
I would like to add the follow
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 08/27/2013 02:32 AM, Sebastian Krahmer wrote:
> Now, thats an interesting point! Once all email is encrypted, how
> many mail providers would be interested in offering free service at
> all,
Another question might be, how many e-mail services woul
On 26/08/13 08:47 AM, Richard Clayton wrote:
Even without the recent uproar over email privacy, at some point, someone was
going to come up with a product along the following lines: Buy a cheap,
preconfigured box with an absurd amount of space (relative to the "huge" amounts
of space, like 10GB
Iang wrote:
>Why do we need the 1980s assumption of >being able to send freely to
>everyone, anyway?
tech.supp...@i.bought.your.busted.thing.com is one that comes to mind.
i...@sale.me.your.thing.com is another. I think the types of "prior whitelist
only" secure systems being discussed on-list
On 08/27/2013 18:34, ianG wrote:
> Why do we need the 1980s assumption of being able to send freely to
> everyone, anyway?
It's clear you're not a journalist or working in any other profession
where you actually need to be able to communicate spontaneously with
strangers.
wg
--
www.pelicancrossi
On Tue, Aug 27, 2013 at 2:04 PM, Wendy M. Grossman <
wen...@pelicancrossing.net> wrote:
> It's clear you're not a journalist or working in any other profession
> where you actually need to be able to communicate spontaneously with
> strangers.
>
And if the people who attacked the NY Times' DNS to
On Tue, Aug 27, 2013 at 5:04 PM, Wendy M. Grossman <
wen...@pelicancrossing.net> wrote:
> On 08/27/2013 18:34, ianG wrote:
> > Why do we need the 1980s assumption of being able to send freely to
> > everyone, anyway?
>
> It's clear you're not a journalist or working in any other profession
> where
Phillip Hallam-Baker wrote:
>One hypothesis that I would like to throw >out is that there is no point in
>accepting >encrypted email from someone who does >not have a key to encrypt
>the response.
I'd agree, as I was in just this position in the last week or so: I got a gpg
encryped email from
I wonder if much of the work on secure DHT's and such is based on bad
assumptions. A DHT is just a key/value mapping. There are two reasons to want
to distribute such a thing: To deal with high, distributed load; and because
it's too large to store on any one node. I contend that the second
On Tue, 27 Aug 2013 21:13:59 -0400 Jerry Leichter
wrote:
> I wonder if much of the work on secure DHT's and such is based on
> bad assumptions. A DHT is just a key/value mapping. There are two
> reasons to want to distribute such a thing: To deal with high,
> distributed load; and because it's
On Tue, 27 Aug 2013 21:33:01 + radi...@gmail.com wrote:
> Iang wrote:
>
> >Why do we need the 1980s assumption of >being able to send freely
> >to everyone, anyway?
>
> tech.supp...@i.bought.your.busted.thing.com is one that comes to
> mind. i...@sale.me.your.thing.com is another. I think the
On Tue, 27 Aug 2013 22:04:22 +0100 "Wendy M. Grossman"
wrote:
> On 08/27/2013 18:34, ianG wrote:
> > Why do we need the 1980s assumption of being able to send freely
> > to everyone, anyway?
>
> It's clear you're not a journalist or working in any other
> profession where you actually need to be
On Tue, 27 Aug 2013, Perry E. Metzger wrote:
> Say that you want to distribute a database table consisting of human
> readable IDs, cryptographic keys and network endpoints for some
> reason. Say you want it to scale to hundreds of millions of users.
This sounds remarkably like a description of DN
On 8/27/13 7:48 PM, Perry E. Metzger wrote:
> On Tue, 27 Aug 2013 22:04:22 +0100 "Wendy M. Grossman"
> wrote:
>> On 08/27/2013 18:34, ianG wrote:
>>> Why do we need the 1980s assumption of being able to send freely
>>> to everyone, anyway?
>>
>> It's clear you're not a journalist or working in any
On 8/27/13 7:45 PM, Perry E. Metzger wrote:
> On Tue, 27 Aug 2013 21:33:01 + radi...@gmail.com wrote:
>> Iang wrote:
>>
>>> Why do we need the 1980s assumption of >being able to send freely
>>> to everyone, anyway?
>>
>> tech.supp...@i.bought.your.busted.thing.com is one that comes to
>> mind.
On Tue, 27 Aug 2013 19:57:30 -0600 Peter Saint-Andre
wrote:
> On 8/27/13 7:47 PM, Jonathan Thornburg wrote:
> > On Tue, 27 Aug 2013, Perry E. Metzger wrote:
> >> Say that you want to distribute a database table consisting of
> >> human readable IDs, cryptographic keys and network endpoints for
> >
On 8/27/13 7:47 PM, Jonathan Thornburg wrote:
> On Tue, 27 Aug 2013, Perry E. Metzger wrote:
>> Say that you want to distribute a database table consisting of human
>> readable IDs, cryptographic keys and network endpoints for some
>> reason. Say you want it to scale to hundreds of millions of user
On 08/28/2013 02:48, Perry E. Metzger wrote:
> Of course, as a reporter, you are probably getting email addresses of
> people to talk to via referral, and that could be used to get past the
> barrier. The problem of people spontaneously contacting a published
> address is harder.
I do the latter a
On Wed, 28 Aug 2013 03:04:25 +0100 "Wendy M. Grossman"
wrote:
> On 08/28/2013 02:48, Perry E. Metzger wrote:
> > Of course, as a reporter, you are probably getting email
> > addresses of people to talk to via referral, and that could be
> > used to get past the barrier. The problem of people spont
Unsubscribe
___
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography
On Aug 27, 2013, at 9:41 PM, Perry E. Metzger wrote:
> On Tue, 27 Aug 2013 21:13:59 -0400 Jerry Leichter
> wrote:
>> I wonder if much of the work on secure DHT's and such is based on
>> bad assumptions. A DHT is just a key/value mapping. There are two
>> reasons to want to distribute such a th
On Tue, Aug 27, 2013 at 10:18 PM, Perry E. Metzger wrote:
> On Tue, 27 Aug 2013 19:57:30 -0600 Peter Saint-Andre
> wrote:
> > On 8/27/13 7:47 PM, Jonathan Thornburg wrote:
> > > On Tue, 27 Aug 2013, Perry E. Metzger wrote:
> > >> Say that you want to distribute a database table consisting of
> >
On Aug 27, 2013, at 9:48 PM, Perry E. Metzger wrote:
> On Tue, 27 Aug 2013 22:04:22 +0100 "Wendy M. Grossman"
> wrote:
>> On 08/27/2013 18:34, ianG wrote:
>>> Why do we need the 1980s assumption of being able to send freely
>>> to everyone, anyway?
>>
>> It's clear you're not a journalist or wo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
> The DHT model says that millions of Raspberry Pi's and thumb drives together
> implement
> this immense database. But since a DHT, by design, scatters the data around
> the network
> at random, *my* thumb drive is full of information that I will
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
> Suppose, as in Bitcoin, my email address *is* my public key
You can even use some hash compression tricks so you only need 9 or 10
characters to express the address as hash of the public key.
That works very well, until you have to change the pub
25 matches
Mail list logo