Re: Defending users of unprotected login pages with TrustBar 0.4.9.93

2005-09-21 Thread Adam Back
I would think it would be safer to block the site, or provide a warning dialog. (This is what I was expecting when I started reading the head post; I was bit surprised at the interventionism to actually go ahead and fix the site, maybe that would be a better default behavior). btw Regarding

Re: Defending users of unprotected login pages with TrustBar 0.4.9.93

2005-09-21 Thread dan
Dare I say that the best must not be the enemy of the good? --dan - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

Re: Java: Helping the world build bigger idiots

2005-09-21 Thread Greg Black
On 2005-09-20, Jerrold Leichter wrote: One thing to consider is that an idiom like this solves an annoying problem. Consider a linear search through an array: for (i = 0; i lim; i++) { if (a[i] == target) { do something break;

Re: [Clips] Contactless payments and the security challenges

2005-09-21 Thread Bill Frantz
One issue I have not seen addressed in these contactless payment systems is the needs of people who carry multiple payment instruments. A simple example is a personal and a corporate credit card. Cheers - Bill - Bill Frantz

Re: Java: Helping the world build bigger idiots

2005-09-21 Thread Jerrold Leichter
| One thing to consider is that an idiom like this solves an annoying problem. | Consider a linear search through an array: | | for (i = 0; i lim; i++) | { if (a[i] == target) | { do something | break; | } | } |

Re: Java: Helping the world build bigger idiots

2005-09-21 Thread Steve Furlong
On 9/20/05, Rich Salz [EMAIL PROTECTED] wrote: This is wandering way far afield of the list charter. In an effort to maintain some relevance, I'll point out that code reviews, and crypto programming, are rarely done, and arguably shouldn't, by programming wizards. If by that you mean,

Re: [Clips] Contactless payments and the security challenges

2005-09-21 Thread Bill Frantz
On 9/21/05, [EMAIL PROTECTED] (Nick Owen) wrote: Interesting question. I know that we can solve it on a application-enabled cell phone with public keys - each service has only swapped public keys so you can have any number. Can such a thing be done on an RFID card too? Bill Frantz wrote: One