http://www.cebit.de/top-21508.html?druckeboot=1news_article_id=350archiv=1
CeBIT: Federal German Ministry of Economics Forces E-mail Encryption
At the CeBIT the Federal German Ministry of Economics distributes for free
the mail encryption program GnuPP 1.1 complete with manual. The mail
--- begin forwarded text
Status: U
To: [EMAIL PROTECTED]
From: Werner Koch [EMAIL PROTECTED]
Organisation: g10 Code GmbH
Lines: 21
User-Agent: Gnus/5.090006 (Oort Gnus v0.06) Emacs/20.7
(i386-debian-linux-gnu)
Subject: [Announce] Announcing a GnuPG plugin for Mozilla (Enigmail)
Sender:
At 7:21 PM -0500 on 3/20/02, Roop Mukherjee wrote:
I am searching for some citable references about secure peripheral cards.
Contrary to what I had imagined when I had started searching, I found very
little. I am looking to see what are the peripherals that have
cryptographic capabilities
--- begin forwarded text
Status: U
From: Simson Garfinkel [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [SIMSOFT] Identity Card Delusions
Sender: [EMAIL PROTECTED]
List-Help: mailto:[EMAIL PROTECTED]?subject=help
List-Post: mailto:[EMAIL PROTECTED]
List-Subscribe:
Question. Is it possible to have code that contains a private encryption
key safely?
As a practical matter, yes and no. Practically no, because any way you
hide the encryption key could be reverse engineered. Practically yes,
because if you work at it you can make the key hard enough to reverse
On Thu, Mar 21, 2002 at 10:02:20AM -0500, R. A. Hettinga wrote:
At 7:21 PM -0500 on 3/20/02, Roop Mukherjee wrote:
I am searching for some citable references about secure peripheral cards.
Contrary to what I had imagined when I had started searching, I found very
little. I am looking to
At 8:52 PM -0800 3/20/02, Mike Brodhead wrote:
The usual good solution is to make a human type in a secret.
Of course, the downside is that the appropriate human must be present
for the system to come up properly.
It's not clear to me what having the human present accomplishes.
While the
At 08:52 PM 3/20/2002 -0800, Mike Brodhead wrote:
The usual good solution is to make a human type in a secret.
Of course, the downside is that the appropriate human must be present
for the system to come up properly.
Yes, of course, that is why I wrote:
The usual bad solution is to store it
http://www.nytimes.com/2002/03/21/technology/circuits/21DRIV.html?todaysheadlines=pagewanted=printposition=top
March 21, 2002
Finding Pay Dirt in Scannable Driver's Licenses
By JENNIFER 8. LEE
OSTON -- ABOUT 10,000 people a week go to The Rack, a bar in Boston favored
by sports stars,
Wired News article on the CBDTPA:
http://www.wired.com/news/politics/0,1283,51245,00.html
The bill, called the Consumer Broadband and Digital Television
Promotion Act (CBDTPA), prohibits the sale or distribution of nearly
any kind of electronic device -- unless that device includes
Many thanks on all the pointers and interest.
Although I was planning on sneaking around making more progress before
letting the cat out the bag, I guess it is time to expose it for some open
criticism.
This is just a plan so far, no code yet. Although until the ability to
safely split
11 matches
Mail list logo