Re: [cryptography] Request - PKI/CA History Lesson

2014-05-02 Thread ianG
On 2/05/2014 06:41 am, Jeffrey Goldberg wrote: On 2014-05-01, at 8:49 PM, ianG i...@iang.org wrote: On 1/05/2014 02:54 am, Jeffrey Goldberg wrote: On 2014-04-30, at 6:36 AM, ianG i...@iang.org wrote: OK. So let me back peddle on “Ann trusts her browser to maintain a list of trustworthy

Re: [cryptography] Request - PKI/CA History Lesson

2014-05-02 Thread Marcus Brinkmann
On 05/01/2014 10:25 AM, Ben Laurie wrote: On 1 May 2014 08:19, James A. Donald jam...@echeque.com wrote: On 2014-04-30 02:14, Jeffrey Goldberg wrote: On 2014-04-28, at 5:00 PM, James A. Donald jam...@echeque.com wrote: Cannot outsource trust Ann usually knows more about Bob than a distant

Re: [cryptography] Request - PKI/CA History Lesson

2014-05-02 Thread ianG
On 2/05/2014 13:06 pm, Marcus Brinkmann wrote: On 05/01/2014 10:25 AM, Ben Laurie wrote: On 1 May 2014 08:19, James A. Donald jam...@echeque.com wrote: On 2014-04-30 02:14, Jeffrey Goldberg wrote: On 2014-04-28, at 5:00 PM, James A. Donald jam...@echeque.com wrote: Cannot outsource trust

Re: [cryptography] Request - PKI/CA History Lesson

2014-05-02 Thread Marcus Brinkmann
On 05/02/2014 01:33 PM, ianG wrote: For me the sentence, “I had little choice but to trust X” is perfectly coherent. Yes, that still works. It is when it goes to no choice that it fails. For example, I have no choice but to use my browser for online banking. I'm too far from a branch,

[cryptography] NSA TEMPEST NONSTOP Document Released

2014-05-02 Thread John Young
Just declassified and released after 8 years from FOIA request: NSA TEMPEST 01-02 NONSTOP Evaluation Standard (Oct 2002): http://cryptome.org/2014/05/nsa-tempest-01-02-oct-02.pdfhttp://cryptome.org/2014/05/nsa-tempest-01-02-oct-02.pdf (3.2MB) Compare NONSTOP Techniques from 1975:

Re: [cryptography] Request - PKI/CA History Lesson

2014-05-02 Thread ianG
On 2/05/2014 13:42 pm, Marcus Brinkmann wrote: On 05/02/2014 01:33 PM, ianG wrote: For me the sentence, “I had little choice but to trust X” is perfectly coherent. Yes, that still works. It is when it goes to no choice that it fails. For example, I have no choice but to use my browser