Re: Delta CAPPS-2 watch: decrypt boarding passes!

2003-03-07 Thread Russell Nelson
John Gilmore writes: And, besides identifying what cities they're doing this in, we should also start examining a collection of these boarding passes, looking for the encrypted let me through without searching me information. Or the Don't let me fly information. Then we can evaluate how

Re: Re: Delta CAPPS-2 watch: decrypt boarding passes!

2003-03-07 Thread Russell Nelson
John Ioannidis writes: (they [TSA] still picked up random people without the search string on their boarding passess). HHH! If this list was to have a subtitle it would be Practical uses of randomness. Surely they're rolling dice, or cutting a well-shuffled deck, or

Crypto in court Friday

2002-10-15 Thread Russell Nelson
[ quoted from the qmail mailing list. -russ ] For those of you wondering when qmail is going to start protecting mail messages against eavesdropping and forgery: I'll be in San Francisco Friday morning in front of Judge Patel arguing that the remaining crypto regulations are unconstitutional.

Re: trade-offs of secure programming with Palladium (Re: Palladium: technical limits and implications)

2002-08-15 Thread Russell Nelson
Adam Back writes: So there are practical limits stemming from realities to do with code complexity being inversely proportional to auditability and security, but the extra ring -1, remote attestation, sealing and integrity metrics really do offer some security advantages over the current

RE: Challenge to David Wagner on TCPA

2002-08-10 Thread Russell Nelson
Jim Choate writes: On Mon, 5 Aug 2002, Russell Nelson wrote: AARG!Anonymous writes: So don't read too much into the fact that a bunch of anonymous postings have suddenly started appearing from one particular remailer. For your information, I have sent over 400 anonymous

Re: Challenge to TCPA/Palladium detractors

2002-08-10 Thread Russell Nelson
AARG!Anonymous writes: I'd like the Palladium/TCPA critics to offer an alternative proposal for achieving the following technical goal: Allow computers separated on the internet to cooperate and share data and computations such that no one can get access to the data outside the

1024-bit RSA key safety still unknown

2002-07-29 Thread Russell Nelson
Dan Bernstein has a response to the June 2002 Lenstra-Shamir-Tomlinson-Tromer paper (and similarly, Bruce Schneier's comments) about his research into the cost of circuits for integer factorization. http://cr.yp.to/nfscircuit.html -- -russ nelson http://russnelson.com | New

Re: Schneier on Bernstein factoring machine

2002-04-17 Thread Russell Nelson
Derek Atkins writes: Russell Nelson [EMAIL PROTECTED] writes: The union of the two sets of cryptography users and paranoid people is necessarily non-empty. Who would bother to use cryptography sans a threat model? And if you've got a non-empty threat model, then by definition

Re: Schneier on Bernstein factoring machine

2002-04-17 Thread Russell Nelson
Dan Geer writes: The union of the two sets of cryptography users and paranoid people is necessarily non-empty. Who would bother to use cryptography sans a threat model? And if you've got a non-empty threat model, then by definition you're paranoid. Uh, I don't have

Re: PGP GPG compatibility

2002-02-10 Thread Russell Nelson
Lucky Green writes: On Sat, 9 Feb 2002, Russell Nelson wrote: I think the only worthwhile way forward is to create a cryptographic email standard de novo, which is free of export, trademark, and patent problems. I believe such a standard already exists. It is called S/MIME. Best

Re: PGP GPG compatibility

2002-02-09 Thread Russell Nelson
Werner Koch writes: Things would get much better if a PGP 2 version with support for CAST5 would get more into use. [ etc. ] I know that you're working hard, Werner, but I believe that the recent few years have destroyed the PGP brandname. I think the only worthwhile way forward is to

Re: CFP: PKI research workshop

2002-01-01 Thread Russell Nelson
Andrew Odlyzko writes: 1. Cryptography does not fit human life styles easily. 2. Novel technologies take a long time to diffuse through society. to which I would add: 3. Cryptography, and therefore PKI, is meaningless unless you first define a threat model. In all the messages with this

forwarded message from tylera19@hotmail.com

2001-05-14 Thread Russell Nelson
This is the goofiest spam I've ever gotten. How many bits are contained in the message below the % signs? Could be quite a few, depending on your dictionary of nouns, verb, adjectives, and adverbs. Sure looks like a message to me. As far as I know, I'm not expecting any steganographic messages