* John Ioannidis:
I wonder how much it cost them to find current addresses for
everybody so we could be notified.
I guess it's pretty easy because your personal information is
available to so many organizations, without any safeguards.
Obviously, they had your social security number (it's only
James A. Donald wrote:
Many protocols use some form of self describing data format, for example
ASN.1, XML, S expressions, and bencoding.
Why?
gml (precursor to sgml, html, xml, etc)
http://www.garlic.com/~lynn/subtopic.html#sgml
was invented at the science center in 1969
re:
http://www.garlic.com/~lynn/aadsm27.htm#24 Why self describing data formats:
for other archaeological trivia ... later i transferred from the science center
to SJR and got to do some of the work on the original relational/sql
implementation,
System/R.
a few years later, the L in GML also
re:
http://www.garlic.com/~lynn/aadsm27.htm#22 A crazy thought?
for some other topic drift regarding certification authorities ... having been
certification
authorities for digital certificates targeted at the (electronic but)
offline market
... they encountered a number of issues in the
Ian G wrote:
What you are suggesting is called Web of Trust (WoT). That's what the
PGP world does, more or less, and I gather that the SPKI concept
includes it, too.
However, x.509 does not support it. There is no easy way to add
multiple signatures to an x.509 certificate without running
Initially I did not believe it, thought it must be hype or hoax.
Nope, it is a rootkit in hardware.
http://www.intel.com/business/vpro/index.htm
: : Isolate security tasks—in a separate
: : environment that is hidden to the user
: :
: : [...]
: :
: : Perform hardware and