On Fri, Jul 3, 2009 at 4:37 AM, Jack Lloyd wrote:
> On Thu, Jul 02, 2009 at 09:29:30AM +1000, silky wrote:
> > A potentially amusing/silly solution would be to have one strong key
> > that you change monthly, and then, encrypt *that* key, with a method
> > that will be brute-forceable in 2 months a
On Jul 1, 2009, at 4:29 PM, silky wrote:
On Wed, Jul 1, 2009 at 6:48 PM, Udhay Shankar N
wrote:
Udhay Shankar N wrote, [on 5/29/2009 9:02 AM]:
Fascinating discussion at boing boing that will probably be of
interest
to this list.
http://www.boingboing.net/2009/05/27/what-will-happen-to.htm
On Thu, Jul 02, 2009 at 09:29:30AM +1000, silky wrote:
> A potentially amusing/silly solution would be to have one strong key
> that you change monthly, and then, encrypt *that* key, with a method
> that will be brute-forceable in 2 months and make it public. As long
> as you are constantly changi
On Wed, Jul 1, 2009 at 6:48 PM, Udhay Shankar N wrote:
> Udhay Shankar N wrote, [on 5/29/2009 9:02 AM]:
> > Fascinating discussion at boing boing that will probably be of interest
> > to this list.
> >
>> http://www.boingboing.net/2009/05/27/what-will-happen-to.html
>
> Followup article by Cory Doc
Udhay Shankar N wrote, [on 5/29/2009 9:02 AM]:
> Fascinating discussion at boing boing that will probably be of interest
> to this list.
>
> http://www.boingboing.net/2009/05/27/what-will-happen-to.html
Followup article by Cory Doctorow:
http://www.guardian.co.uk/technology/2009/jun/30/data-prot
Fascinating discussion at boing boing that will probably be of interest
to this list.
http://www.boingboing.net/2009/05/27/what-will-happen-to.html
Udhay
--
((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com))
-
The