[EMAIL PROTECTED] writes:
my understanding from a person active in the NEA working group (IETF) is that
TPMs these days come along for free because they're included on-die in at
least one of said chips.
Check again. A few months ago I was chatting with someone who works for a
large US computer
Actually I worked on a project recently that had this scenario.
Paramedic team picks up heart attack/stroke/serious accident
patient. The paramedic tending the patient is using a laptop to
record EKG or other electronic medical process.
Even with the siren on they get in a serious accident
James A. Donald:
Is anyone aware of a commercial product that
implements secret sharing? If so, can I get a
pointer to some product literature?
It's available as part of other products (e.g. nCipher
do it for keying their HSMs), but I don't know of any
product that just
Lynne or Anne,
At 10:30 AM 6/22/2007 -0600, Anne Lynn Wheeler wrote:
A secure Internet requires a secure network protocol
Actually I think we need a shadow Internet that is used only for security
purposes (and is
On Jun 22, 2007, at 10:44 AM, Ali, Saqib wrote:
...whereas the key distribution systems we have aren't affected by
eavesdropping unless the attacker has the ability to perform 2^128 or
more operations, which he doesn't.
Paul: Here you are assuming that key exchange has already taken place.
[Perry -- I have no connection to Nokia whatsoever and am thrilled with
the phone in question, but the message below sounds like an
advertisement so please reject from the list if inappropriate.]
[Moderator's note: this is off topic, but there were a couple of what
is that phone messages to the
James A. Donald:
In the case of XML, yes there is a parsing engine,
and if the structure of the DTD reflects the
structure of the algorithm, then indeed it makes
things much easier. But usually the committee have
not thought about the algorithm, or have unresolved
Alex Alten wrote:
SSL seems to be hanging by a thread, mainly the name to public key mapping
depends on how thorough the checking is done in to SSL vs application
inside of the web browser. If this is hosed then unrestricted MITM is
in the cards
sometime in the near future.
On Mon, Jun 11, 2007 at 11:28:37AM -0400, Richard Salz wrote:
Many protocols use some form of self describing data format, for example
ASN.1, XML, S expressions, and bencoding.
I'm not sure what you're getting at. All XML and S expressions really get
you is that you know how to skip past
Peter Gutmann wrote:
I've seen all sorts of *claims* of TPM support, but try going out and buying a
PC with one
Of the 25 business laptop models that HP offers on its site right now,
only 5 don't have a TPM installed.
Ivan Krstić [EMAIL PROTECTED] | GPG: 0x147C722D
Mail list logo