Re: cryptograph(y|er) jokes?

2004-06-24 Thread Don Davis
part away... for a pictorial version, see the attachment. - don davis, boston -<>

Re: Security Architect Position at National Archives

2004-05-08 Thread Don Davis
run a firewall or vulnerabiility > check, or who can cite NIST security standard (although those > skills woul dcome in handy too!). i talked to them. the downside is that they want this security architect to be the security administrator, once the system is built...

Re: [Mac_crypto] Apple should use SHA! (or stronger) to authenticate software releases

2004-04-04 Thread Don Davis
ruhr university (in bochum), but i don't know whether he's more of a free agent. - don davis, boston > To: [EMAIL PROTECTED] > From: "Arnold G. Reinhold" <[EMAIL PROTECTED]> > Subject: [Mac_crypto] Apple should use SHA! (or strong

Israeli coders, Arab testers

2004-03-31 Thread Don Davis
from "the volokh conspiracy" weblog, a law professors' blog: - don Eugene Volokh, 3/25/2004 04:02:38 PM Israeli coders, Arab testers: A reader writes, apropos checking sensitive source code for sabotage: I spoke to [someone] from the NSA, about this sub

RE: Monoculture

2003-10-03 Thread Don Davis
er version of MSIE ships on Win2k/XP . MSIE 5 is all i have on my mac, because i very rarely use MSIE. but, if you want to complain about MSIE's security features, you'll have to take a number and wait in line... B^( - don davis, boston - -

RE: Monoculture

2003-10-02 Thread Don Davis
Browser > Security > Certificate Authorities (there seems to be no way to tell MSIE 5 to trust Alice's server cert for SSL connections, except to tell MSIE 5 to trust Alice's CA.) in NS 4.75: Communicator > Tools > Security

Re: Monoculture

2003-10-01 Thread Don Davis
favor of small code size & ease of configuration. arguably, this is as much an opportunity as a wake-up call. - don davis - - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Re: Monoculture

2003-10-01 Thread Don Davis
o literature has fully met these customers' crypto needs. - don davis, boston - - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Information-Theoretic Analysis of Information Hiding

2003-07-15 Thread Don Davis
"An electrical engineer at Washington University in St. Louis has devised a theory that sets the limits for the amount of data that can be hidden in a system and then provides guidelines for how to store data and decode it. Contrarily, the theory also provides guidelines for how an adversary

Re: traffic analysis of phone calls?

2003-07-12 Thread Don Davis
multi-million pound systems to see who > was grassing to informants...? with similar import, here's cringely's article on insecure CALEA workstations: - don davis http://www.pbs.org/cringely/pulpit/pulpit20030710.html "Not only can the

google crypto?

2003-06-29 Thread Don Davis
does anyone know anything about AP's claim that Google "encrypts" credit-card numbers? specifically, which cipher and what kind of key management do they use? - don davis, boston - From: &