So the latest Snowden data contains hints that the NSA (a) spends a great deal
of money on cracking encrypted Internet traffic; (b) recently made some kind of
a cryptanalytic breakthrough. What are we to make of this? (Obviously, this
will all be wild speculation unless Snowden leaks more
Unsubscribe
___
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography
On Thu, Aug 29, 2013 at 01:30:35PM -0400, Perry E. Metzger wrote:
On Wed, 28 Aug 2013 20:04:34 +0200 Faré fah...@gmail.com wrote:
One thing that irks me, though, is the problem of the robust, secure
terminal: if everything is encrypted, how does one survive the
loss/theft/destruction of a
Okay...
User-side spec:
1. An email address is a short string freely chosen by the email user.
It is subject to the constraint that it must not match anyone else's
email address, but may (and should) be pronounceable in ordinary language
and writable with the same character set
On Fri, 30 Aug 2013, Ray Dillinger wrote:
3. When an email user gets an email, s/he is absolutely sure that it comes
from the person who holds the email address listed in its from line.
S/he may or may not have any clue who that person is. S/he is also
sure that no one else has
On Aug 29, 2013, at 7:00 PM, Phillip Hallam-Baker wrote:
...The code synthesis scheme I developed was an attempt to address the
scaling problem from the other end. The idea being that to build a large
system you create a very specific programming language that is targeted at
precisely that
On 08/30/2013 01:52 PM, Jonathan Thornburg wrote:
On Fri, 30 Aug 2013, Ray Dillinger wrote:
3. When an email user gets an email, s/he is absolutely sure that it comes
from the person who holds the email address listed in its from line.
S/he may or may not have any clue who that