Cypherpunk Eric Hughes: Der Überwachungsalptraum ist wahr geworden -
http://t.co/hZAWMTEKWZ (DE only) Die Zeit
Google transla tion:
http://translate.google.com/translate?sl=autotl=enu=http%3A//t.co/hZAWMTEKWZ
Better link:
From: John Young j...@pipeline.com
To: crypt...@freelists.org, cryptography@randombit.net
Sent: Friday, September 13, 2013 11:46:02 AM
Subject: [cryptography] MITM Manipulation of Snowden Documents
It continues to mystify why Greenwald and others crop and
redact documents and slides but show them
It had no certificate.
Why is that?
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography
Certainly spam, and probably malware.
- Original Message -
From: jd.cypherpunks jd.cypherpu...@gmail.com
To: cryptography@randombit.net
Sent: Monday, June 25, 2012 2:14:54 PM
Subject: Re: [cryptography] (no subject)
Maybe spam - maybe helpful :D
--Michael
Nikolai Stoianov
Flame's too big to take on alone, says Microsoft
by Alastair Stevenson
More from this author
21 Jun 2012
Seattle: Cyber threats like Flame are too big and too advanced for even the
most security savvy of companies to take on alone, according to Microsoft
Trustworthy Computing senior
[[Seen on Eugen Leitl's list]]
http://www.pastie.org/3867284
The Internet Kill Switch; With Global Wiretapping Capability?
One company to rule them all
One company to find them;
One company to bring them all
And in the darkness bind them
Recently run any whois queries on Google? No?
Cop tools easily bypass 4-digit passcodes
By John Leyden • Get more from this author
Posted in Enterprise Security, 10th April 2012 08:22 GMT
Analysis Forensic tools against smartphones allow basic 4-digit phone passcodes
to be bypassed in minutes.
However, more complex passcodes are far
From: ianG i...@iang.org
Sorry, I beg to differ. The average folks in the world today never
heard of the crypto war and certainly were not influenced by it.
A bit like saying that the average iPhone user never heard of GSM and
was certainly not influenced in it :)
I have an iPhone.
I don't
http://agtb.wordpress.com/2012/02/17/john-nashs-letter-to-the-nsa/
John Nash’s Letter to the NSA
February 17, 2012 by Noam Nisan
The National Security Agency (NSA) has recently declassified an amazing
letter that John Nash sent to it in 1955. It seems that around the year 1950
Nash tried
From: Jeffrey I. Schiller j...@qyv.net
I bet everyone on this list can send encrypted messages to each other
and they will never be broken... because they probably already know
who we all are and (at least I hope) have put us all in the mostly
harmless bucket.
The people who missed the breakup
From: James A. Donald jam...@echeque.com
Warren Buffet correctly argues that gold will, on average,
lose value. However there is a significant risk that
everything except gold will lose value.
There is no risk that potable water or salt or (properly maintained) rifles
with ammunition will lose
Which is why the average random geek needs to be reminded, over and over
again, that you NEVER talk to the police. Not a word. Ever. If you're feeling
kind, write them a note, I don't talk to police. They should leave wondering
whether you're mute.
Uh, you know the bit where I said that the
From: John Levine jo...@iecc.com
The definitive work on financial bubbles is Kindleberger's Manias,
Panics, and Crashes: A History of Financial Crises. Get the 2005 5th
edition, which was edited by Robert Solow after Kindleberger died.
I really shouldn't continue this OT thread any longer, but
Speaker: Prof. Thomas Jennewein (University of Waterloo, Institute for
Quantum Computing and Department of Physics and Astronomy)
Title: Quantum Encryption and Quantum Science with Satellites
Abstract: Space offers a very unique environment for quantum physics
experiments at regimes for
Crypto shocker: four of every 1,000 public keys provide no security (updated)
By Dan Goodin | Published February 15, 2012 6:00 AM
Crypto shocker: four of every 1,000 public keys provide no security (updated)
Keys that share one prime factor are vulnerable to cracking by anyone. Keys
that share
From: James A. Donald jam...@echeque.com
Not only is their lower class law abiding, their bankers and
bureaucrats, unlike ours are also law abiding.
From which it is evident that the death penalty *does* deter, both for
institutions and individuals.
Sub-Saharan Africa is in general hotter
Serious Flaw Emerges In Quantum Cryptography
Posted: 24 Jan 2012 09:10 PM PST
The perfect secrecy offered by quantum mechanics appears to have been scuppered
by a previously unknown practical problem, say physicists
The problem of sending messages securely has troubled humankind since
From: lodewijk andré de la porte lodewijka...@gmail.com
I'd like to add to this conversation, as a side note, that a new type of
security has (fairly) recently emerged: legal security. It's illegal to
break in, so we don't need security. Quite common in convenience stores,
people's homes and
From: Peter Gutmann pgut...@cs.auckland.ac.nz
To: cryptography@randombit.net, rv...@insightbb.com
Sent: Tue, 03 Jan 2012 01:51:26 -0500 (EST)
Subject: Re: [cryptography] CAPTCHA as a Security System?
Randall Webmail rv...@insightbb.com writes:
My neighborhood Wal*Mart has pretty much eliminated
From: Thor Lancelot Simon t...@panix.com
To: Randall Webmail rv...@insightbb.com
Cc: Crypto List cryptography@randombit.net
Sent: Tue, 03 Jan 2012 01:58:46 -0500 (EST)
Subject: Re: [cryptography] CAPTCHA as a Security System?
On Tue, Jan 03, 2012 at 01:57:10AM -0500, Randall Webmail wrote
From: Kevin W. Wall kevin.w.w...@gmail.com
Boy, the latter sounds like advice that a black hat hacker would give someone
to
ensure simple dictionary attacks are successful. Your dog's name? Really???
Beats the usual method of writing it on a Post-It note where the janitorial
staff can see.
From: Kevin W. Wall kevin.w.w...@gmail.com
Or whatever. The misconception is of course, that this
truly is best practice. Pretty sure that it's some CYA
policy along this line that is driving this. And IT has learned
it's just easy to implement whatever legal requests than to
argue the
From: Nico Williams n...@cryptonector.com
What should matter is that malware should not be able to gain control
of the device or other user/app data on that device, and, perhaps,
that the user not even get a chance to install said malware, not
because the malware's signatures don't chain up to a
From: jd.cypherpunks jd.cypherpu...@gmail.com
David Ulevitch is rolling out OpenDNS http://david.ulevitch.com/
What do you think?
He's been running https://www.opendns.com/ for quite some time.
I read somewhere that the project is making $200K a month by selling the
redirects, but a) That
From: Adam Back a...@cypherspace.org
I'd be very interested to be proven wrong. I'll even offer $100 by a
payment means of the (optionally anonymous) posters chosing to the first
person who can send the list (or me offlist if you must) a MitM cert with a
valid cert chain for some form of public
From: ianG i...@iang.org
It does store certs. It just takes above beyond to get at them.
Unknown whether it stores certs that you reject.
I spend a lot of time in hotels, and it is VERY common for me to get one of
those popups complaining about certificates when I connect to the hotel WiFi.
From: Peter Gutmann pgut...@cs.auckland.ac.nz
To: cryptography@randombit.net
Sent: Monday, September 19, 2011 2:32:21 PM
Subject: Re: [cryptography] Another data point on SSL trusted root
CA reliability (S Korea)
Ralph Holz h...@net.in.tum.de writes:
In terms of warkitting
From: Seth David Schoen sch...@eff.org
To: Crypto discussion list cryptography@randombit.net
Sent: Tuesday, September 13, 2011 2:31:59 PM
Subject: Re: [cryptography] Let's go back to the beginning on this
HTTPS Everywhere makes users encounter this situation more than they
otherwise might.
A
From: Ralph Holz h...@net.in.tum.de
To: Crypto discussion list cryptography@randombit.net
Sent: Tuesday, September 13, 2011 7:14:39 PM
Subject: Re: [cryptography] Let's go back to the beginning on this
Hi,
HTTPS Everywhere makes users encounter this situation more than they
otherwise might.
A common, perhaps the most common, attack on corporations is
to get
inside the corporate network through wifi, then mount an sql
injection attack on the corporate database, then steal the
corporate database.
This often causes extremely large monetary losses.
A very large percentage of
30 matches
Mail list logo