Travis H. [EMAIL PROTECTED] writes:
Ignoring special-purpose hardware, does anyone have thoughts on what the
requirements for a kernel-level key management subsystem should be?
Yes, but first you'd have to tell me what you're trying to do.
Peter.
Alex Alten [EMAIL PROTECTED] writes:
This may be a bit off the crypto topic, but it is interesting nonetheless.
Russia accused of unleashing cyberwar to disable Estonia
http://www.guardian.co.uk/print/0,,329864981-103610,00.html
Estonia accuses Russia of 'cyberattack'
At 6:34 PM + 5/20/07, John Levine wrote:
I've heard nothing formal, but my strong understanding is a lot of US
government machines, at least if we're talking workstations on
non-classified nets, are in fact 0wn3d at this point.
Well, here's an anecdote: at last year's CEAS conference,
A while ago, I did a rough calculation that made
me state that 15-30% of all machines are no longer
under the sole control of their owner. In the
intervening months, I got some hate mail on this,
but in those same intervening months Vint Cerf
said 40%, Microsoft said 2/3rds, and IDC said
Quoting the original article:
A mighty number falls
Mathematicians and number buffs have their records. And today, an
international team has broken a long-standing one in an impressive
feat of calculation.
On March 6, computer clusters from three institutions \u2013 the
EPFL,
On Mon, May 21, 2007 at 02:44:28PM -0400, Perry E. Metzger wrote:
http://www.physorg.com/news98962171.html
My take: clearly, 1024 bits is no longer sufficient for RSA use for
high value applications, though this has been on the horizon for some
time. Presumably, it would be a good idea to
At 01:04 PM 5/18/2007, Trei, Peter wrote:
If the Russians aren't behind this, who else should be
suspected? It isn't like Estonia has a wide selection of
enemies. :-)
There are three likely suspects
- the actual Russian government (or some faction thereof)
- Russian Mafia for whatever reasons