On 16/02/13 16:19 PM, Peter Gutmann wrote:
I wrote:
Those are some pretty odd stats... Camellia is almost as popular as 3DES?
To which Yaron Sheffer pointed me to:
http://stackoverflow.com/questions/10378066/which-algorithm-is-stronger-for-tls-aes-256-or-camellia-256
which says:
The rea
This is precisely how I2P eepsites work. The true addresses are [52
characters of b32 encoded checksum of public key].b32.i2p while the
hosts.txt file is a list of these with their readable [sitename].i2p
domains. You can modify your own lists as you wish.
I2P Messenger and Bote mail could be comb
On 2013-02-17 4:49 AM, Jonathan Warren wrote:
A primary goal has been to make a clean and simple interface so that
the key management, authentication, and encryption is simple even for
people who do not understand public-key cryptography.
> Having an explicit motivation ("threat model" in security protocol
parlance) would help in analyzing if this feature provides the desired
benefits. You should also figure out what problems the cluster model
doesn't solve and explicitly identify them. For an example of a threat
model see section
With no criticism to the idea and motivation there are similarities with
having a reply-to of a newsgroup such as alt.anonymous.messages, which is
used as a more secure alternative to reply blocks. To pickup those messages
anonymously you'd ideally need to be able to unobservably download newsgro
On Sat, Feb 16, 2013 at 01:49:18PM -0500, Jonathan Warren wrote:
> Hello everyone, I would like to introduce you to a communications protocol I
> have been working on called Bitmessage. I have also written an open source
> client released under the MIT/X11 license. It borrows ideas from Bitcoin and
Hello everyone, I would like to introduce you to a communications protocol I
have been working on called Bitmessage. I have also written an open source
client released under the MIT/X11 license. It borrows ideas from Bitcoin and
Hashcash and aims to form a secure and decentralized communications pr
I wrote:
>Those are some pretty odd stats... Camellia is almost as popular as 3DES?
To which Yaron Sheffer pointed me to:
http://stackoverflow.com/questions/10378066/which-algorithm-is-stronger-for-tls-aes-256-or-camellia-256
which says:
The reasoning is contained in the NSS library source c