the left side of the rightmost wheel.
It is visible, but must point down to open.
Turn the wheels until you see this, and then turn them another
180 degrees, and: "Open Sesame!"
So no need to bother with a TSA key. Open
it.
The tank cap had a lock inside. All you needed to do is to cut the
plastic lock open and to copy the tumbler lengths to a blank key.
Then you have a working key.
You could do the same and just open some of these locks, one per key
number.
so "seal" the
case with any unusual sticker I got somewhere for free or a paper
sticker.
The method with the cable binder became difficult since it is
forbidden to have a nail scissors in the bord luggage. Sometimes not
that easy to open it without dam
Hi Allen,
On Mon, Feb 26, 2007 at 09:23:30PM -0800, Allen wrote:
> Hi Hadmut,
>
> combination lock brands in the $30 to $45 USD range where you can
> set the combination to whatever you want. Guess what? They all
> seemed to use the same key to enable setting the combination.
p?_room=3&_action=detail&id=72
That's another one:
http://www.eaglecreek.com/accessories/security_id/TSA-SearchAlert-Lock-41027/
The TSA keyhole is always on the other side such that you don't see them.
I am currently in a hurry, but I'll mak
intact and in place instead of
cut off.
This is the point where I decided to have nightmares from now on.
regards
Hadmut
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
did not work. They had to be told
not to type in the serial number engraved at the backside, but the
number displayed on the LCD...).
It's a pity to see it weakened without need to.
regard
Hadmut
-
The Cryptography Mail
login. But when you could use the current token code
as an indicator for searching login data in the input stream, then you
can find new places to login, e.g. your company VPN access point.
While the attack you describe is more important for banking, the
the PIN and the
address of the server to login is contained. Makes it really easy to
automatically detect secrets in the input stream.
Thus, two different authentication methods are together weaker than
each single one.
regards
Hadmut
--
Once you managed to have
your pubkey added to someone else's keyring with an additional empty
user ID (what most users never realize) you could read any encrypted
mail sent by that person.
regards
Hadmut
-
The Cryptography Mai
Page 129: "A principal is anything or anyone participating
in cryptographically protected communication."
- Page 266: "each user and each resource that will be using
Kerberos."
Which edition is yours?
regards
Hadmut
h speaker.
Can anyone give me some hints? Maybe about how 'principal' is related
to Roger Needham? Or whether there is a precise and general
definition?
Who, btw, would have the authority to generally define terms in
security science?
regards
Hadmut
--
" When designing
measures against spam, we should take this into consideration.
Maybe in near future the advantages of that noise produced by millions
of bots will outweigh the disadvantages?
Comments are welcome.
Hadmut Danisch
s WIKID's certificate verification
procedure more reliable than the one of the "trusted CAs" ?
Hadmut
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
.
regards
Hadmut
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
ID cards officially.
Last November I attended an Anti-Spam-Summit at FTC in Washington
DC. As usual they were checking for metal in the clothes, x-raying
bags, and (*surprise*) asking for a picture ID. Someone didn't have
a driving license. They accepted his WalMar
sually applying for an ID card is not a problem at all.
For reasons far beyond cryptography my father chose an
unusual given name for me, one that was usual in around the 8th-10th
century. He named me Hadmut. Most people in Germany have never heard
that name before and don't believe, that this n
ne
can not prove to be an encryption algorithm?
regards
Hadmut
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
remote control to open the
doors by pressing a button at the key.
Does this attack compromise the theft protection only or the door
opener as well?
regards
Hadmut
-
The Cryptography Mailing List
Unsubscribe by sending "
tended to choose any row, but to use the row directly
under the plaintext row as cipher text. Instead of the
line indicator from Jefferson, they have a sliding
bar with two windows for two subsequent rows.
regards
Hadmut
-
The C
Dean, James wrote:
The order of the wheels can't be changed.
So this encryption device doesn't use any key?
regards
Hadmut
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
Hi,
does anyone know where I can get a
Jefferson Wheel or a replica?
regards
Hadmut
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
should ask the publisher for a translation, because under
german copyright law even the translation is a right of the author.
regards
Hadmut
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
do believe
that this requires some discussion.
I'd propose a separate mailing list for that.
regards
Hadmut
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
is where reality and the science of cryptography differ.
It does not work because not all attackers agree to
play the Alice&Bob game.
regards
Hadmut
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
immons is mentioned several times, but this might not
have been part of the talk but a personal annotation of the
person who made the transcript.
Does anyone know about such a talk?
(The notes are available at
http://www
nication.
But avoiding faked TCP resets is also a matter of authenticity.
Does 'opportunistic authentication' exist?
regards
Hadmut
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
hijacked and raped by patent claims.
regards
Hadmut
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
).
Thanks, that's a pretty good hint, especially because it contains
an explicit statement, and it's an FAQ, making it easy to show, that
the university's claim is not just wrong, but silly. :-)
regards
Hadmut
-
T
ssion rate for a file people often
forget, that some information is not stored in the file itself, but in
the file system, e.g. the file length (telling where the compressed
data stops) and the file name (telling you, that the file was
compressed). That's basical
m to take any random string taken
from /dev/random under Linux. They don't care. The german principle is
that a faculty is always right by definition.
> 3) Diagram the pigeon-hole argument for the judge. See
> diagrams below.
I'll try that. Thanks.
regards
Hadmut
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
ing theory which explicitely states
the impossibility of such a compression method in plain language?
regards
Hadmut
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
Hi,
does anyone know good jokes about
cryptography, cryptographers, or security?
regards
Hadmut
[Moderator's note: I know of several security systems that are jokes
in and of themselves, but that doesn't seem to be what you meant.
a summary, I don't expect any innovations. Not more than within
the last 10 years.
But I'm pretty sure that security will be more and more important
and that's were I expect innovations and progress. Security doesn't
necessarily mean cryptography.
regards
Hadmut
finitions
(or attempts to give those), and I'd be interested to compare
them. If you know of any definition that might be interesting
for any reason, please send me a link or citation. thanx
regards
Hadmut
-
The Cryptography
rtises. Some people even
explicetely confirmed that my dissertation is correct and the
expertises are wrong. This just doesn't matter in any way.
Isn't that spooky? What kind of business is cryptography?
regards
Hadmut
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
d security just to do a colleague a favor,
when he erroneously assumed the expertise would be kept secret? Would
such a cryptographer be considered as burned? Wouldn't he give more
false expertises once he's getting paid for or asked by his government?
I'd be interested in
x27;t find any details, just marketing blabla.
regards
Hadmut
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
ith the way Michal Rokos wrapped
openssl into an object oriented API, but it would be good to
have this in more languages, it still allows improvements and
is still incomplete.
regards
Hadmut
-
The Cryptography Ma
an identity of the receiver. Even if it is true that just a single
receiver can read the information, it is still unknown, _who_
it is. All you know is that you send information which can be read
by a single receiver only. And you hope that this receiver was the
goo
ut cryptography, but not without a firewall and content filters.
But many people still insist on the claim that cryptography is by far
the most important and only scientific form of network security.
Is cryptography where security took the wrong branch?
regards
Hadmut
re there anyway? (except
for the standard tools SSL, X.509,...)
Is there a survey of where in e-business cryptography
is actually being used between customers and providers?
How many shops do use SET for payment?
regards
Hadmut
--
42 matches
Mail list logo