Re: Undergraduate wireless LAN security project?

2004-10-07 Thread Chris Kuethe
There's the ever popular wireless security gateway. Assume you have a mixed population of users on the wireless, some of whom are trustworthy, some are evil. Some are Admin users, some are guests. Some are wizards, some are clueless. All of them want to "do their thing on the wireless." Keeping i

Re: 3DES performance

2004-12-08 Thread Chris Kuethe
On Wed, 8 Dec 2004 13:33:27 +0100, Lee Parkes <[EMAIL PROTECTED]> wrote: > Hi, > I'm working on a project for a company that involves the use of 3DES. They > have > asked me to find out what the overheads are for encrypting a binary file. > There > will be quite a lot of traffic coming in (in the

Re: Conspiracy Theory O' The Day

2005-01-05 Thread Chris Kuethe
On Tue, 04 Jan 2005 15:41:12 -0500, John Denker <[EMAIL PROTECTED]> wrote: > Udhay Shankar N wrote: > > I just got a batch of spam: perfectly justified blocks of random-looking > > characters. Makes me wonder if somebody is trying to train Bayesian > > filters to reject PGP messages. Or someone is

Re: link-layer encryptors for Ethernet?

2005-02-07 Thread Chris Kuethe
http://www.google.com/search?q=ethernet+link+encryptor says that there are. There's even a widget that supposedly runs up to gigabit. http://www.atmedia.de/english/news.html I'm enough of a freenix zealot though that I'd build one out of a couple of opteron boxen with gig ether cards and run ether

Re: link-layer encryptors for Ethernet?

2005-02-09 Thread Chris Kuethe
http://www.gdds.com/company/portfolio.html#ias http://www.gdc4s.com/Products/sectera.htm Maybe one of these nifty looking general dynamics widgets is what you're after? -- GDB has a 'break' feature; why doesn't it have 'fix' too?

Re: How secure is the ATA encrypted disk?

2005-05-26 Thread Chris Kuethe
On 4/8/05, James A. Donald <[EMAIL PROTECTED]> wrote: > -- > Every ATA disk contains encryption firmware, though not > all bioses allow you to use it. Not all drives contain this "encryption" firmware, which isn't actually encryption firmware. It's more of a login feature. You have to send the

Re: WYTM - "but what if it was true?"

2005-06-27 Thread Chris Kuethe
On 6/26/05, Dan Kaminsky <[EMAIL PROTECTED]> wrote: > It is not necessary though that there exists an acceptable solution that > keeps PC's with persistent stores secure. A bootable CD from a bank is > an unexpectedly compelling option, as are the sort of services we're > going to see coming out o

Re: WYTM - "but what if it was true?"

2005-06-29 Thread Chris Kuethe
On 6/27/05, Victor Duchovni <[EMAIL PROTECTED]> wrote: > On Mon, Jun 27, 2005 at 09:58:31AM -0600, Chris Kuethe wrote: > > > And now we have a market for cracked "trusted" banking clients, both > > for phishers and lazy people... it's game copy protection wa

Re: Another entry in the internet security hall of shame....

2005-08-26 Thread Chris Kuethe
On 8/26/05, Steven M. Bellovin <[EMAIL PROTECTED]> wrote: > ... > If you don't trust your (or your correspondents') IM servers, it may be > a different situation. I haven't read Google's privacy policies for > IM; if it's anything like gmail, they're using automated tools that > look at your messa

Re: AES implementation in C - any recommendations?

2005-09-03 Thread Chris Kuethe
On 9/2/05, Ian G <[EMAIL PROTECTED]> wrote: > I'm after an AES implementation in C, preferably with > something approximating BSD/open licence. Does anyone > have a view on which would be a current favourite? > > (I'm writing a protocol that needs it, and would like > to deliver the code totally

Re: European country forbids its citizens from smiling for passport photos

2005-09-17 Thread Chris Kuethe
On 9/17/05, William Allen Simpson <[EMAIL PROTECTED]> wrote: > Do you really need to click on this link to know which one it is? > > http://cbs5.com/watercooler/watercooler_story_258152613.html > > I guess we should give neutral facial expressions for the photo, then > smile (or frown) while in t

Re: Dirty Secrets of "noise based" RNGs

2006-07-05 Thread Chris Kuethe
On 7/4/06, Thor Lancelot Simon <[EMAIL PROTECTED]> wrote: 2) Hifn used to make this documentation publically available but access to it now requires permission from Hifn sales -- it has been password protected on their public web site. In other words, after years of design wins based on

Re: (Short) Intro and question

2007-01-08 Thread Chris Kuethe
On 1/6/07, Allen <[EMAIL PROTECTED]> wrote: One of the questions that I have been raising is trust and how to ensure that that it is not misplaced or eroded over time. Which leads me to my question for the list: I can see easily how to do split key for 2 out of x for key recovery, but I can't see

Re: It's a Presidential Mandate, Feds use it. How come you are not using FDE?

2007-01-18 Thread Chris Kuethe
On 1/18/07, Saqib Ali <[EMAIL PROTECTED]> wrote: Since when did AES-128 become "snake-oil crypto"? How come I missed that? Compusec uses AES-128 . And as far as I know AES is NOT "snake-oil crypto" He didn't say that AES is snake oil. He says he wants assurance that the tool operates correctly.

Re: Seagate announces hardware FDE for laptop and desktop machines

2007-09-07 Thread Chris Kuethe
On 9/6/07, Jacob Appelbaum <[EMAIL PROTECTED]> wrote: > Seagate recently announced a 1TB drive for desktop systems and a 250GB > laptop drive. What's of interest is that it appears to use a system > called DriveTrust for Full Disk Encryption. It's apparently AES-128. Yes, but will it work on my Ul

Re: the joy of "enhanced" certs

2008-06-05 Thread Chris Kuethe
On Wed, Jun 4, 2008 at 12:51 PM, Perry E. Metzger <[EMAIL PROTECTED]> wrote: > An object lesson in this just fell in my lap -- I just got my first > email from a spammer that links to a web site that uses such a cert, > certified by a CA I've never heard of ("Starfield Technologies, Inc.") starfie

Re: security questions

2008-08-06 Thread Chris Kuethe
On Wed, Aug 6, 2008 at 8:23 AM, Peter Saint-Andre <[EMAIL PROTECTED]> wrote: > Wells Fargo is requiring their online banking customers to provide answers > to security questions such as these: > > *** > ... > *** > > It strikes me that the answers to many of these questions might be public > inform

Re: [Cryptography] Radioactive random numbers

2013-09-13 Thread Chris Kuethe
(curse you anti-gmail-top-posting zealots...) On Wed, Sep 11, 2013 at 3:47 PM, Dave Horsfall wrote: > Another whacky idea... > > Given that there is One True Source of randomness to wit radioactive > emission, has anyone considered playing with old smoke detectors? Yep. For fun I wrote a custo