On Thu, Dec 12, 2013 at 08:04:00AM -0800, Steve Weis wrote:
On Dec 12, 2013 6:08 AM, coderman coder...@gmail.com wrote:
i see your skepticism, and i raise you a retort! ;)
i even have a list of candidates you can experiment with to confirm
Intel Ivy Bridge as best fit. [0]
I think this
On Wed, Dec 11, 2013 at 06:28:31PM -0800, Steve Weis wrote:
On Wed, Dec 11, 2013 at 6:00 PM, coderman coder...@gmail.com wrote:
unredacted:
https://peertech.org/dist/nsa-cpp-goals-FY2013-unredact.png
Intel Ivy Bridge
Is this a guess because Intel Ivy Bridge fits into the redacted
On Sat, Nov 09, 2013 at 08:28:17PM -0800, d.nix wrote:
surely someone here has an opinion...
http://www.nist.gov/itl/csd/ct/nist_beacon.cfm
From the page, a relevant suggestion:
WARNING:
DO NOT USE BEACON GENERATED
VALUES AS SECRET
CRYPTOGRAPHIC KEYS.
The Beacon is a
On Sun, Sep 29, 2013 at 09:43:54AM -0400, John Young wrote:
http://www.ccrwest.org/
The latter's web site lists only this offering:
La Jolla Covering Repository
A (v,k,t)-covering design is a collection of k-element subsets,
called blocks, of {1,2,...,v}, such that any t-element subset
On Sat, Sep 21, 2013 at 09:24:43PM +0300, jd.cypherpu...@gmail.com wrote:
Cypherpunk Eric Hughes: Der Überwachungsalptraum ist wahr geworden -
http://t.co/hZAWMTEKWZ (DE only) Die Zeit
Why on earth do you route through t.co.
http://www.zeit.de/digital/internet/2013-09/cypherpunks-eric-hughes
On Sat, Feb 16, 2013 at 01:49:18PM -0500, Jonathan Warren wrote:
Hello everyone, I would like to introduce you to a communications protocol I
have been working on called Bitmessage. I have also written an open source
client released under the MIT/X11 license. It borrows ideas from Bitcoin and
On Fri, Oct 26, 2012 at 06:29:47PM +, John Case wrote:
So, given what is in the stanford report and then reading this rant
about openssl, I am wondering just how bad openssl is ? I've never
had to implement it or code with it, so I really have no idea.
How long has it been understood