Re: Clearing sensitive in-memory data in perl

2005-09-14 Thread Enzo Michelangeli
- Original Message - From: Perry E. Metzger [EMAIL PROTECTED] To: [EMAIL PROTECTED] Cc: cryptography@metzdowd.com Sent: Tuesday, September 13, 2005 11:32 PM Subject: Re: Clearing sensitive in-memory data in perl [...] What the world really needs is something between C++ and C -- a

Re: Another entry in the internet security hall of shame....

2005-08-26 Thread Enzo Michelangeli
- Original Message - From: Perry E. Metzger [EMAIL PROTECTED] To: Adam Back [EMAIL PROTECTED] Cc: Peter Saint-Andre [EMAIL PROTECTED]; cryptography@metzdowd.com Sent: Friday, August 26, 2005 8:55 PM Subject: Re: Another entry in the internet security hall of shame [...] Remember

Re: EMV

2005-07-14 Thread Enzo Michelangeli
AFAIK, the cards are still the same (Sony FeliCa: http://www.sony.net/Products/felica/): I never changed mine since I got it several years ago. The same card was also adopted in 2002 by EZ-Link in Singapore (http://www.ezlink.com.sg ). Enzo - Original Message - From: Anne Lynn Wheeler

Re: entropy depletion (was: SSL/TLS passive sniffing)

2005-01-08 Thread Enzo Michelangeli
- Original Message - From: [EMAIL PROTECTED] To: cryptography@metzdowd.com Sent: Friday, January 07, 2005 9:30 AM Subject: Re: entropy depletion (was: SSL/TLS passive sniffing) From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Enzo Michelangeli Sent: Tuesday, January

Re: entropy depletion (was: SSL/TLS passive sniffing)

2005-01-06 Thread Enzo Michelangeli
- Original Message - From: John Denker [EMAIL PROTECTED] Sent: Thursday, January 06, 2005 3:06 AM Enzo Michelangeli wrote: [...] If the PRNG uses a really non-invertible algorithm (or one invertible only with intractable complexity), its output gives no insight whatsoever

Re: Your source code, for sale

2004-11-18 Thread Enzo Michelangeli
- Original Message - From: Ian Grigg [EMAIL PROTECTED] To: Hal Finney [EMAIL PROTECTED] Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED] Sent: Sunday, November 07, 2004 11:21 AM [Hal:] Interesting. In the e-gold case, both parties have the same bank, e-gold ltd. The

Re: Your source code, for sale

2004-11-06 Thread Enzo Michelangeli
- Original Message - From: Hal Finney [EMAIL PROTECTED] Sent: Friday, November 05, 2004 7:01 AM Tyler Durden writes: So my newbie-style question is, is there an eGold that can be verified, but not accessed, until a 'release' code is sent? In other words, say I'm buying some

Re: Can Skype be wiretapped by the authorities?

2004-05-25 Thread Enzo Michelangeli
- Original Message - From: Bill Stewart [EMAIL PROTECTED] Sent: Sunday, May 09, 2004 12:44 PM Subject: Re: Can Skype be wiretapped by the authorities? [...] BUT, unfortunately, the implementation is closed source, so there are no guarantees that the software is not GAKked. Also no

Re: Problems with GPG El Gamal signing keys?

2003-11-27 Thread Enzo Michelangeli
- Original Message - From: Perry E.Metzger [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Thursday, November 27, 2003 7:24 AM Subject: Problems with GPG El Gamal signing keys? Some notes have been floating around claiming that there are bugs in GPG's use of El Gamal keys. For

Re: Are there...one-way encryption algorithms

2003-11-17 Thread Enzo Michelangeli
if something better can be done. Enzo - Original Message - From: Amir Herzberg [EMAIL PROTECTED] To: 'Enzo Michelangeli' [EMAIL PROTECTED]; [EMAIL PROTECTED] Sent: Sunday, November 16, 2003 10:44 PM Subject: RE: Are there...one-way encryption algorithms Enzo asked, Are there one-way

Are there...

2003-11-13 Thread Enzo Michelangeli
...one-way encryption algorithms guaranteed to be injective (i.e., deterministically collision-free)? Or are there theoretical reasons against their existence? I'm looking for algorithms where every piece of code and data is public, thus excluding conventional enciphering with a secret key. Enzo

Re: blackmail / real world stego use

2003-08-27 Thread Enzo Michelangeli
- Original Message - From: bear [EMAIL PROTECTED] Cc: [EMAIL PROTECTED] Sent: Wednesday, August 27, 2003 5:49 AM Subject: Re: blackmail / real world stego use [...] That would imply packet recording and correlation on a level greater than we've ever considered to be in the arsenal of