anon. registration (was Re: Computer Security Division Activities)

2001-10-14 Thread Carl Ellison
At 12:35 AM 10/14/2001 GMT, David Wagner wrote: Mike Brodhead wrote: Just about all of the private-sector conferences I have attended require registration. I think this is a poor example. I expect you'd be welcome to use the name 'John Smith' and pay cash, if you like. Using the name John

Re: Computer Security Division Activities

2001-10-14 Thread Declan McCullagh
On Fri, Oct 12, 2001 at 10:28:52PM -0700, John Gilmore wrote: What is this lunacy about registering? Does someone seriously think that terrorists will attack the National Institute of Standards? Or that if they were serious about attacking, they wouldn't just pre-register their real or fake

Re: anon. registration (was Re: Computer Security Division Activities)

2001-10-14 Thread Michael Froomkin - U.Miami School of Law
It's often cheaper not to handle cash because you can use employees in a lower pay grade and/or ones who are not bonded. Cash is easier to steal, the incentive to palm it rather than ring it up is higher. and there are often extensive bureaucratic rules about handling it throughout the food

Re: Computer Security Division Activities

2001-10-13 Thread John Gilmore
workshop is scheduled for November 1-2 at NIST. Registration is REQUIRED because of enhanced security procedures (i.e., so that attendees can be admitted to the NIST campus). Please see http://csrc.nist.gov/encryption/kms/workshop2-page.html for registration information. What is this

Re: Computer Security Division Activities

2001-10-13 Thread Mike Brodhead
I will not participate in activities that require me to identify myself to the government, or to be pre-vetted for attendance. Just about all of the private-sector conferences I have attended require registration. The same goes for any decent hotel. Does this bother me? Sure it does, but

Re: Computer Security Division Activities

2001-10-13 Thread David Wagner
Mike Brodhead wrote: Just about all of the private-sector conferences I have attended require registration. I think this is a poor example. I expect you'd be welcome to use the name 'John Smith' and pay cash, if you like. I think the real point is this: We see, all too often, cases where it

Computer Security Division Activities

2001-10-11 Thread Elaine Barker
NIST's Computer Security Division has recently made the following information available: 1. A report of the Second Modes of Operation Workshop, which was held in the Santa Barbara area on August 24, is available at http://csrc.nist.gov/encryption/modes/workshop2/index.html. 2. A change