in place for this, perhaps one might
be able to generate a key on demand, with the appropriate access
permissions.
Udhay
[1] http://www.symantec.com/business/support/index?page=content&id=TECH149500
--
((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com))
_
up with a
solution, which involves a cryptographic technique called salting that
involves randomly juggling a private key's digits.
The research is funded by the National Science Foundation and the
Gigascale Systems Research Center.
--
((Udhay Shankar N)) ((udhay @ p
Udhay Shankar N wrote, [on 5/29/2009 9:02 AM]:
> Fascinating discussion at boing boing that will probably be of interest
> to this list.
>
> http://www.boingboing.net/2009/05/27/what-will-happen-to.html
Followup article by Cory Doctorow:
http://www.guardian.co.uk/technology/2009
Symposium on Theory of Computing
> (STOC), 2009.
I was wondering if anyone on this list could recommend a good,
entry-level piece on the Gentry paper referenced above, and its
implications. Failing which, anyone wants to take a stab at it?
Udhay
Fascinating discussion at boing boing that will probably be of interest
to this list.
http://www.boingboing.net/2009/05/27/what-will-happen-to.html
Udhay
--
((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com))
-
The
Perry E. Metzger wrote, [on 8/28/2008 10:09 PM]:
Given this, I think the time for focusing on the privacy implications
of payment transponders and fare cars is over. Not carrying a cell
phone will not help you avoid tracking when your environment is
saturated with cameras. Digital cash toll coll
give up the goods at Black Hat
in August. That should give folks enough time to patch their systems.
--
((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com))
-
The Cryptography Mailing List
Unsubscribe by sending
of the satellite spotters who, needing little more than a pair of
binoculars, a stop watch and star charts, uncover some of the deepest of
the government’s expensive secrets and share them on the Internet.
--
((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com
http://www.claybennett.com/pages/security_fence.html
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
virtual tags,
and can potentially produce 128bit random numbers capable of passing
cryptographic statistical tests.
--
((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com))
-
The Cryptography Mailing List
Unsubscribe by
.
"Certainly, people need to raise the level of vigilance," Sunner said.
--
((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com))
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
of PGP, this was handled by Zimmermann publishing his public key in
the (dead-trees) version of his book.
Udhay
[1] http://en.wikipedia.org/wiki/Web_of_trust
--
((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com))
-
At 10:27 AM 5/2/2007, Aram Perez wrote:
<http://farm1.static.flickr.com/191/480556169_6d731d2416_o.jpg>
From another list:
This was one of my faves bits of html from last night
Makes a nice flag..fly it
--
((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digerat
e technique look perfectly normal but a
camera can see the code printed into the image.
The technique can currently store just 12 bytes of information - soon
to rise to 24 - the equivalent amount of data in a barcode.
That data could be a phone number, a message or a website link.
--
((Udha
nuary, will have many more options, including the ability to
give the site a list of choices and have it pick one.
--
((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com))
-
The Cryptography Mailing List
Unsubscribe by se
Like the subject says - I'm curious whether the current regime of
inspection and "forensic analysis" of laptops, primarily in the US,
has affected corporate policies regarding disk crypto.
Is there anybody studying this? Any resources available online?
Thanks,
Udhay
--
((
http://it.slashdot.org/article.pl?sid=06/06/04/1311243
--
((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com))
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
some surprising characteristics of mediums and
frequencies, scientists have gained insight into acoustic time
reversal, which could impact applications such as sending
confidential messages in cryptography.
--
((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratu
<http://lists.gnupg.org/pipermail/gnupg-announce/2006q1/000216.html>http://lists.gnupg.org/pipermail/gnupg-announce/2006q1/000216.html
GnuPG does not detect injection of unsigned data...
--
((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digerat
gain. :)
Does anybody know if there were followups to the Caligula virus,
which was a proof-of-concept that stole PGP keyrings?
Udhay
--
((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com))
-
The Cryptography Mailing L
complex set of mathematical algorithms to
sensitive data with the aim of making Bruce Schneier exceedingly rich
--
Udhay
--
((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com))
-
The Cryptography Mailing List
Conference, who argued that restrictions originally created to
prevent the transfer of advanced technologies from the United States are
now having the opposite effect.
--
((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com
ace. One of the code talkers sent
the first message of D-Day: "Right beach, wrong place."
--
((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com))
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
ore to start up - I can't afford anything too
fancy.
* Keep things simple. I'm no crypto expert; I know I'm not capable of
coming up with an ssh replacement. So I need to keep things so utterly
simple that I can be sure I'm not missing anything important.
;s probably scratching his head yet down in his grave."
He said they called Nazi dictator Adolph Hitler "posah tai vo" which means
"crazy white man."
The Germans could not understand them, thus the Comanches were called "code
talkers.
I just got a batch of spam: perfectly justified blocks of random-looking
characters. Makes me wonder if somebody is trying to train Bayesian filters
to reject PGP messages.
Udhay
--
((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com
found at http://webpages.charter.net/allanms/2004/07/instant-immortality.html
"Amateurs study cryptography; professionals study economics."
(Bob Hettinga, this is your cue. :)
Udhay
--
((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.dig
lsome and heavily
litigated nature of Indian democracy, a lot of us were
expecting post-election drama, but only a few, if any,
fingers were found pointing.
Things didn't fare so well in the United States.
--
((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.dig
At 04:56 AM 7/14/2004, J.A. Terranson wrote:
Recently a list member requested public ftp/web space for the hosting of
various crypto files.
Also see: http://munitions.vipul.net/
For Linux-based crypto software only, AFAIK. Multi-homed, hosted outside
the US.
Udhay
--
((Udhay Shankar N)) ((udhay
dit cards" - basically, a credit card number valid for one use
only, which would be ideal for online purchasing.
IIRC, the offering was withdrawn because there weren't enough takers.
Udhay
--
((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com))
--
eing sent through remailers. What happens to that?
Udhay
--
((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com))
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
at the same time, so the real question is what path will give us
the most identity for the least loss of privacy or the most privacy with
the least amount of identity?
--
((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com))
computer against its owner. In effect, the
computer's owner is sometimes treated as just another attacker or adversary
who must be prevented from breaking in and altering the computer's software.
link: http://www.eff.org/Infra/trusted_computing/20031001_tc.php
--
((Udhay Shankar N)) (
quot;success is getting what you want & happiness is wanting what you get"
http://www.nytimes.com/library/tech/99/01/biztech/articles/17drop.html
http://www.livejournal.com/users/a2gsg/
-- End of Forwarded Message
--
containing a username, like above.
Udhay
--
((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com))
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
and Industry has pledged cash to help the
researchers refine their work and bring commercial quantum cryptography
products to market.
Dr Shields said commercial products should be ready in three years' time.
The researchers will be making their work public at the Conference on
36 matches
Mail list logo