Quoting "Steven M. Bellovin" <[EMAIL PROTECTED]>:
In an article on disk encryption
(http://www.theregister.co.uk/2006/04/26/pgp_infosec/), the following
paragraph appears:
BitLocker has landed Redmond in some hot water over its insistence
that there are no back doors for law enf
On Wed, Apr 26, 2006 at 09:53:27PM -0400, Steven M. Bellovin wrote:
> In an article on disk encryption
> (http://www.theregister.co.uk/2006/04/26/pgp_infosec/), the following
> paragraph appears:
>
> BitLocker has landed Redmond in some hot water over its insistence
> that there are no
On Wed, 26 Apr 2006 22:24:22 -0400, Derek Atkins <[EMAIL PROTECTED]> wrote:
> Quoting "Steven M. Bellovin" <[EMAIL PROTECTED]>:
>
> > In an article on disk encryption
> > (http://www.theregister.co.uk/2006/04/26/pgp_infosec/), the following
> > paragraph appears:
> >
> > BitLocker has landed
Quoting "Steven M. Bellovin" <[EMAIL PROTECTED]>:
> What is a "master key" in this context?
ADK, the Additional Decryption Key. An enterprise with a Managed
PGP Desktop installed base can set up an ADK and all messages get
encrypted to the ADK in addition to the recipient's key.
Ah -- corpo
http://www.helenair.com/articles/2006/04/26/ap/strange/d8h7t2f8n.txt
http://www.helenair.com/articles/2006/04/26/ap/strange/d8h7s6805.prt
Judge Hints at Code in 'Da Vinci' Ruling
By JENNIFER QUINN
LONDON - The judge who presided at the "Da Vinci Code" copyright
infringement trial has put a cod
I was manager of development for Project Athena beginning
in 1985. Amongst our projects was Kerberos, and, as you
know, it was a direct implementation of Needham-Schroeder.
Schroeder had been Jerome Saltzer's Ph.D. student and
Saltzer was the MIT faculty member in charge of the
technical side o
tmcghan quoted:
SDSI's active agents (principals) are keys: specifically, the private keys
that sign statements. We identify a principal with the
corresponding verification (public) key...
Calling a key a "principal" (and saying that a key "speaks") is just
a poetic language used in SDSI/SPKI.
Latest Da Vinci mystery: judge's own secret code
Thu Apr 27, 2006 8:11 AM ET
By Peter Graff
LONDON (Reuters) - Three weeks after a British court passed judgment in
the copyright case involving Dan Brown's bestseller "The Da Vinci Code,"
a lawyer has uncovered what may be a secret message buried i
>From Computerworld:
New phishing scam model leverages VoIP
Novelty of dialing a phone number lures in the unwary
News Story by Cara Garretson
APRIL 26, 2006
(NETWORK WORLD) - Small businesses and consumers aren't the only ones
enjoying the cost savings of switching to voice over IP
(VoIP)
the other point that should be made about voip is that
callerid is trivial to spoof.
so if you are counting on the calling party being who they say the are,
or even within your company, based on callerid, don't.
i predict a round of targeted attacks on help desks and customer
service, as well a
| the other point that should be made about voip is that callerid is
| trivial to spoof.
|
| so if you are counting on the calling party being who they say the
| are, or even within your company, based on callerid, don't.
|
| i predict a round of targeted attacks on help desks and customer
| serv
On Thu, Apr 27, 2006 at 01:12:43PM -0700, [EMAIL PROTECTED] wrote:
> so if you are counting on the calling party being who they say the are,
> or even within your company, based on callerid, don't.
>
> does anyone know if time ANI from toll free services is still unspoofable?
make that "real-tim
> "mis" == mis <[EMAIL PROTECTED]> writes:
mis> does anyone know if [real-]time ANI from
mis> toll free services is still unspoofable?
No, in general it is not unspoofable.
But you probably need the gateway into the PSTN to use SS7 and IMT
trunks; and that probably means a CLEC license in t
13 matches
Mail list logo