Peter Gutmann stated..
> The person that I quoted in my message is effectively Mr.NSS. I'd say
> his
> statement is fairly authoritative
On 2011-07-16 4:16 AM, =JeffH wrote:
my understanding is that that is no longer the case.
We have a massive crisis (phishing) which Eke can solve, and
cer
On Fri, Jul 15, 2011 at 10:52:39PM +0200, Meredith L. Patterson wrote:
> On Fri, Jul 15, 2011 at 6:45 PM, Marsh Ray wrote:
>
> > On 07/14/2011 01:59 PM, Steven Bellovin wrote:
> >
> >> Put another way, the goal in a trial is not a mathematical proof,
> >> it's proof to a certain standard of evide
On Fri, Jul 15, 2011 at 6:45 PM, Marsh Ray wrote:
> On 07/14/2011 01:59 PM, Steven Bellovin wrote:
>
>> Put another way, the goal in a trial is not a mathematical proof,
>> it's proof to a certain standard of evidence, based on many different
>> pieces of data. Life isn't a cryptographic protoco
Peter Gutmann stated..
>
> The person that I quoted in my message is effectively Mr.NSS. I'd say his
> statement is fairly authoritative
my understanding is that that is no longer the case.
=JeffH
___
cryptography mailing list
cryptography@randombit
On Fri, Jul 15, 2011 at 12:45 PM, Marsh Ray wrote:
> On 07/14/2011 01:59 PM, Steven Bellovin wrote:
>>
>> did the first party hack into the second party's computer and plant
>> the log file? had someone else hacked into it and used it to talk
>> with the first party? -- but that's also outside th
On 07/13/2011 09:37 PM, Ai Weiwei wrote:
Hello list,
Recently, Wired published material on their website which are claimed
to be logs of instant message conversations between Bradley Manning
and Adrian Lamo in that infamous case. [1] I have only casually
skimmed them, but did notice the followin
On 07/14/2011 01:59 PM, Steven Bellovin wrote:
did the first party hack into the second party's computer and plant
the log file? had someone else hacked into it and used it to talk
with the first party? -- but that's also outside the crypto
protocol.
Put another way, the goal in a trial is not