Looks like an attempt to get people to install DRM. The apple with poison.
http://player.interactual.com/help/support/articles/0134.asp
Q: Is the High-Definition feature (Disc 2) protected with any encryption?
A: The Windows Media movie on the ROM portion of this disc contains
security features
--- begin forwarded text
Status: U
To: "DemocratsConvHall" <[EMAIL PROTECTED]>
From: "CodeTen7" <[EMAIL PROTECTED]>
Mailing-List: list [EMAIL PROTECTED]; contact [EMAIL PROTECTED]
Date: Thu, 26 Jun 2003 23:25:26 -0600
Subject: [johnmacsgroup] INTEL: Venona Project
Reply-To: [EMAIL PROTECTED]
On Fri, 27 Jun 2003 14:02:30 +1200, Peter Gutmann said:
> the GMP source code to know what it does (GMP is a special case, being a
> general bignum library but with an implicit acknowledgement that it's going to
> end up used for crypto as well, although there are some missing primitives
Does the
Le ven 27/06/2003 à 15:24, Werner Koch a écrit :
> Does the proprietary SSH still use GMP? I know no other major crypto
> apps using GMP for big number math. A problem with GMP is that it
> heavily uses alloca() and thus it is not that hard to find traces of
> secrets in the core.
I know that f
--- begin forwarded text
Status: U
Thread-Topic: [CYBERIA] Combining Verizon DMCA case with Grokster
Thread-Index:
AcMU4iXZDMSa+RRWQF2ZUhfFWfqnygAAvxfwAlB7E0AAkYhJYAEs5nrAAGjbCxAAB3Zw8ADDJcDQADTT+2AALZj34AAK9CcQAMC7Y7ADgxgEkA==
Date: Fri, 27 Jun 2003 10:02:33 -0400
Reply-To: Law &
martin f krafft wrote:
> My point was that some commercial vendors (Check Point and others)
> claim, that if two partners want to perform a DH key exchange, they
> may use their two public keys for g and p. This, in effect, would
> mean that g and p were not globally known, but that the public ke
martin f krafft wrote:
> also sprach Peter Fairbrother <[EMAIL PROTECTED]> [2003.06.27.1903 +0200]:
>> Can you give me a ref to where they say that? I'd like to know
>> exactly what they are claiming.
>
> this will have to wait a couple of days.
>
>> Perhaps they are encrypting the DH secrets wi
(I've also posted this message to sci.crypt)
Hi list,
NTRU Cryptosystems has posted several new documents, which are
avaible through http://www.ntru.com/cryptolab/params.htm.
As background: recent results on NTRUEncrypt have shown that
decryption failures on validly encrypted messages leak infor
martin f krafft writes:
> My point was that some commercial vendors (Check Point and others)
> claim, that if two partners want to perform a DH key exchange, they
> may use their two public keys for g and p. This, in effect, would
> mean that g and p were not globally known, but that the public key
Close to 100 people have downloaded the book so far [which is alot
given the nature of the book] and although it has only been two days I
was wondering if anyone has any initial impressions [good or bad].
I'm going to start the editing phase of the text fairly soon so I'd
like to know what people
10 matches
Mail list logo