/ with kind regards,
Guus Sliepen g...@sliepen.org
signature.asc
Description: Digital signature
On Thu, Jan 31, 2008 at 03:46:47PM -0500, Thor Lancelot Simon wrote:
On Thu, Jan 31, 2008 at 04:07:03PM +0100, Guus Sliepen wrote:
Peter sent us his write-up up via private email a few days before he
posted it to this list (which got it on Slashdot). I had little time to
think about
have a web of trust, but
how do you make use of it in an automated way? I expect that the next
round of penis-shaped soundwave therapy will not be focussed on
whether or not an application uses SSL, but on how it (mis)uses SSL.
--
Met vriendelijke groet / with kind regards,
Guus Sliepen
, or modify the software to
allow explicit deletion of certain information. With more that 1 million
nodes it will be even harder to delete data.
--
Met vriendelijke groet / with kind regards,
Guus Sliepen [EMAIL PROTECTED]
signature.asc
Description: Digital signature
On Sat, Jan 14, 2006 at 12:30:25PM -0700, Anne Lynn Wheeler wrote:
Guus Sliepen wrote:
By default, GPG creates a signing key and an encryption key. The signing
key is used both for signing other keys (including self-signing your own
keys), and for signing documents (like emails). However
.
--
Met vriendelijke groet / with kind regards,
Guus Sliepen [EMAIL PROTECTED]
signature.asc
Description: Digital signature
/ with kind regards,
Guus Sliepen [EMAIL PROTECTED]
signature.asc
Description: Digital signature
. Please don't bother arguing
about this.
--
Met vriendelijke groet / with kind regards,
Guus Sliepen [EMAIL PROTECTED]
signature.asc
Description: Digital signature
.
--
Met vriendelijke groet / with kind regards,
Guus Sliepen [EMAIL PROTECTED]
signature.asc
Description: Digital signature
the point of signing instead of encrypting.
--
Met vriendelijke groet / with kind regards,
Guus Sliepen [EMAIL PROTECTED]
signature.asc
Description: Digital signature
On Mon, Sep 29, 2003 at 05:57:46PM +0200, Guus Sliepen wrote:
Now, the attacker chooses 0 as his DH public. This makes ZZ always
equal to zero, no matter what the peer's DH key is.
I think you mean it is equal to 1 (X^0 is always 1).
Whoops, stupid me. Please ignore that.
--
Met
step.
I expect this is a reference to Why TCP Over TCP Is A Bad Idea
http://sites.inka.de/~bigred/devel/tcp-tcp.html
Yes.
If Guus Sliepen and Ivo Timmermans are willing to seriously rethink their
high tolerance for unncessary weakness, I think tinc 2.0 could end up being
a secure piece
design the current protocol as
a replacement of SSL. In fact we replaced something that was worse than
the current protocol.
--
Met vriendelijke groet / with kind regards,
Guus Sliepen [EMAIL PROTECTED]
signature.asc
Description: Digital signature
as secure as anything
else. Comments are welcome.
--
Met vriendelijke groet / with kind regards,
Guus Sliepen [EMAIL PROTECTED]
signature.asc
Description: Digital signature
14 matches
Mail list logo