Re: [cryptography] ssh-keys only and EKE for web too (Re: preventing protocol failings)

2011-07-15 Thread James A. Donald
Peter Gutmann stated.. > The person that I quoted in my message is effectively Mr.NSS. I'd say > his > statement is fairly authoritative On 2011-07-16 4:16 AM, =JeffH wrote: my understanding is that that is no longer the case. We have a massive crisis (phishing) which Eke can solve, and cer

Re: [cryptography] OTR and deniability

2011-07-15 Thread Ian Goldberg
On Fri, Jul 15, 2011 at 10:52:39PM +0200, Meredith L. Patterson wrote: > On Fri, Jul 15, 2011 at 6:45 PM, Marsh Ray wrote: > > > On 07/14/2011 01:59 PM, Steven Bellovin wrote: > > > >> Put another way, the goal in a trial is not a mathematical proof, > >> it's proof to a certain standard of evide

Re: [cryptography] OTR and deniability

2011-07-15 Thread Meredith L. Patterson
On Fri, Jul 15, 2011 at 6:45 PM, Marsh Ray wrote: > On 07/14/2011 01:59 PM, Steven Bellovin wrote: > >> Put another way, the goal in a trial is not a mathematical proof, >> it's proof to a certain standard of evidence, based on many different >> pieces of data. Life isn't a cryptographic protoco

Re: [cryptography] ssh-keys only and EKE for web too (Re: preventing protocol failings)

2011-07-15 Thread =JeffH
Peter Gutmann stated.. > > The person that I quoted in my message is effectively Mr.NSS. I'd say his > statement is fairly authoritative my understanding is that that is no longer the case. =JeffH ___ cryptography mailing list cryptography@randombit

Re: [cryptography] OTR and deniability

2011-07-15 Thread Jeffrey Walton
On Fri, Jul 15, 2011 at 12:45 PM, Marsh Ray wrote: > On 07/14/2011 01:59 PM, Steven Bellovin wrote: >> >> did the first party hack into the second party's computer and plant >> the log file?  had someone else hacked into it and used it to talk >> with the first party? -- but that's also outside th

Re: [cryptography] OTR and deniability

2011-07-15 Thread Marsh Ray
On 07/13/2011 09:37 PM, Ai Weiwei wrote: Hello list, Recently, Wired published material on their website which are claimed to be logs of instant message conversations between Bradley Manning and Adrian Lamo in that infamous case. [1] I have only casually skimmed them, but did notice the followin

Re: [cryptography] OTR and deniability

2011-07-15 Thread Marsh Ray
On 07/14/2011 01:59 PM, Steven Bellovin wrote: did the first party hack into the second party's computer and plant the log file? had someone else hacked into it and used it to talk with the first party? -- but that's also outside the crypto protocol. Put another way, the goal in a trial is not