Seth Schoen posts paper on trusted computing

2003-10-06 Thread Udhay Shankar N
. In effect, the computer's owner is sometimes treated as just another attacker or adversary who must be prevented from breaking in and altering the computer's software. link: http://www.eff.org/Infra/trusted_computing/20031001_tc.php -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com

Re: ADMIN: 'subscribers only' posting

2004-05-27 Thread Udhay Shankar N
through remailers. What happens to that? Udhay -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com)) - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

Re: Public FTP Space (was looking for sites to host my crypto...)

2004-07-15 Thread Udhay Shankar N
At 04:56 AM 7/14/2004, J.A. Terranson wrote: Recently a list member requested public ftp/web space for the hosting of various crypto files. Also see: http://munitions.vipul.net/ For Linux-based crypto software only, AFAIK. Multi-homed, hosted outside the US. Udhay -- ((Udhay Shankar N)) ((udhay

Electonic Voting

2004-11-06 Thread Udhay Shankar N
the quarrelsome and heavily litigated nature of Indian democracy, a lot of us were expecting post-election drama, but only a few, if any, fingers were found pointing. Things didn't fare so well in the United States. SNIP, rest at URL -- ((Udhay Shankar N)) ((udhay @ pobox.com

QotD

2004-11-30 Thread Udhay Shankar N
found at http://webpages.charter.net/allanms/2004/07/instant-immortality.html Amateurs study cryptography; professionals study economics. (Bob Hettinga, this is your cue. :) Udhay -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com

Last WWII Comanche code talker dies in Oklahoma

2005-08-01 Thread Udhay Shankar N
in his grave. He said they called Nazi dictator Adolph Hitler posah tai vo which means crazy white man. The Germans could not understand them, thus the Comanches were called code talkers. snip -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com

Ostiary

2005-08-02 Thread Udhay Shankar N
fancy. * Keep things simple. I'm no crypto expert; I know I'm not capable of coming up with an ssh replacement. So I need to keep things so utterly simple that I can be sure I'm not missing anything important. -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com

Re: Last WWII Comanche code talker dies in Oklahoma

2005-08-02 Thread Udhay Shankar N
the first message of D-Day: Right beach, wrong place. -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com)) - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

no visas for Chinese cryptologists

2005-08-17 Thread Udhay Shankar N
Conference, who argued that restrictions originally created to prevent the transfer of advanced technologies from the United States are now having the opposite effect. snip -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com

Re: NPR : E-Mail Encryption Rare in Everyday Use

2006-03-01 Thread Udhay Shankar N
know if there were followups to the Caligula virus, which was a proof-of-concept that stole PGP keyrings? Udhay -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com)) - The Cryptography Mailing List Unsubscribe

time reversal acoustics

2006-04-22 Thread Udhay Shankar N
surprising characteristics of mediums and frequencies, scientists have gained insight into acoustic time reversal, which could impact applications such as sending confidential messages in cryptography. -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com

U. Washington Crypto Course Available Online For Free

2006-06-06 Thread Udhay Shankar N
http://it.slashdot.org/article.pl?sid=06/06/04/1311243 -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com)) - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

Are laptop search seizures increasing use of disk crypto?

2006-10-26 Thread Udhay Shankar N
Like the subject says - I'm curious whether the current regime of inspection and forensic analysis of laptops, primarily in the US, has affected corporate policies regarding disk crypto. Is there anybody studying this? Any resources available online? Thanks, Udhay -- ((Udhay Shankar N

Startup to launch new random number generator from space

2006-12-21 Thread Udhay Shankar N
, will have many more options, including the ability to give the site a list of choices and have it pick one. snip -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com)) - The Cryptography Mailing List Unsubscribe

Re: The best riddle you wil hear today...

2007-05-02 Thread Udhay Shankar N
bgcolor=#635688/td td bgcolor=#c0/td /tr /table Makes a nice flag..fly it -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com)) - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography

Re: A crazy thought?

2007-06-09 Thread Udhay Shankar N
by Zimmermann publishing his public key in the (dead-trees) version of his book. Udhay [1] http://en.wikipedia.org/wiki/Web_of_trust -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com)) - The Cryptography Mailing List

Hackers target C-level execs and their families

2007-07-05 Thread Udhay Shankar N
. -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com)) - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

Traffic analysis reveals spy satellite details

2008-02-06 Thread Udhay Shankar N
of the satellite spotters who, needing little more than a pair of binoculars, a stop watch and star charts, uncover some of the deepest of the government’s expensive secrets and share them on the Internet. snip -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com

Kaminsky finds DNS exploit

2008-07-09 Thread Udhay Shankar N
give up the goods at Black Hat in August. That should give folks enough time to patch their systems. snip -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com)) - The Cryptography Mailing List Unsubscribe by sending

Re: privacy in public places

2008-08-30 Thread Udhay Shankar N
Perry E. Metzger wrote, [on 8/28/2008 10:09 PM]: Given this, I think the time for focusing on the privacy implications of payment transponders and fare cars is over. Not carrying a cell phone will not help you avoid tracking when your environment is saturated with cameras. Digital cash toll

What will happen to your crypto keys when you die?

2009-05-29 Thread Udhay Shankar N
Fascinating discussion at boing boing that will probably be of interest to this list. http://www.boingboing.net/2009/05/27/what-will-happen-to.html Udhay -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com

Popular explanation of fully homomorphic encryption wanted

2009-06-16 Thread Udhay Shankar N
on this list could recommend a good, entry-level piece on the Gentry paper referenced above, and its implications. Failing which, anyone wants to take a stab at it? Udhay -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com

Re: What will happen to your crypto keys when you die?

2009-07-01 Thread Udhay Shankar N
Udhay Shankar N wrote, [on 5/29/2009 9:02 AM]: Fascinating discussion at boing boing that will probably be of interest to this list. http://www.boingboing.net/2009/05/27/what-will-happen-to.html Followup article by Cory Doctorow: http://www.guardian.co.uk/technology/2009/jun/30/data

1024 bit RSA cracked?

2010-03-16 Thread Udhay Shankar N
involves a cryptographic technique called salting that involves randomly juggling a private key's digits. The research is funded by the National Science Foundation and the Gigascale Systems Research Center. -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com

Re: [Cryptography] Snowden fabricated digital keys to get access to NSA servers?

2013-06-28 Thread Udhay Shankar N
for this, perhaps one might be able to generate a key on demand, with the appropriate access permissions. Udhay [1] http://www.symantec.com/business/support/index?page=contentid=TECH149500 -- ((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com