NSA offers supersecure Linux
By Deni Connor
4 October, 2001 11:20
Framingham, U.S.
http://www.computerworld.com.au/idg2.nsf/a/00043016?OpenDocumentn=ec=CP
The National Security Agency, the government's security arm, along with
help from Network Associates, last week announced it has made a
--- begin forwarded text
Status: U
Date: Thu, 4 Oct 2001 05:49:33 -0700
Reply-To: Law Policy of Computer Communications
[EMAIL PROTECTED]
Sender: Law Policy of Computer Communications
[EMAIL PROTECTED]
From: DigitaEye Designs [EMAIL PROTECTED]
Subject: DECSS (qrpff) Ties
To:
There is an interesting article in Federal Computer Week
http://www.fcw.com/fcw/articles/2001/0910/news-nsa-09-10-01.asp that
says NSA planning a major effort to modernize the nation's
cryptoystems which are rapidly growing obsolete and vulnerable.
They quote Michael Jacobs, head of NSA's
At 11:10 AM -0800 1/5/2001, [EMAIL PROTECTED] wrote:
[EMAIL PROTECTED] said:
I have found significant information about PKI as it exists today,
but am looking for some background information. I'm looking for
information about the history of PKI, how and where it started, how it
developed,
At 5:02 PM -0400 on 10/4/01, ExtremeTech Security wrote:
Zero-Knowledge Systems Discontinues Freedom Network
Services
Zero-Knowledge Systems, a Canadian company which offered
anonymous Web browsing and e-mail services, has announced
that it will be curtailing and/or discontinuing these
I too am very nervous about the prospect of national ID cards. I
have an idea for a possible compromise, but I have not made up my
mind on it. I'm interested in hearing other people's opinions.
The idea is a federal standard for secure drivers' licenses. These
would be cards containing a
At 6:41 PM -0400 on 10/4/01, Arnold G. Reinhold wrote:
Thoughts?
See the work of Stephan Brands, and others, on capabability based credentials.
You don't need anything but the proof of a permission to drive, and
linkability of that proof-token to driving offenses in the database. Nobody
ZeroKnowledge to Discontinue Anonymity Service | Preferences | Top | 294
comments | Search Discussion
Threshold: Save:
The Fine Print: The following comments are owned by whoever posted them. We
are not responsible for them in any way.
Re:Ian Goldberg, Bruce Schneier Whitfield Di (Score:5,
http://abcnews.go.com/sections/primetime/DailyNews/PRIMETIME_011004_steganography.html
A Secret Language
Hijackers May Have Used Secret Internet Messaging Technique
By Brian Ross
Oct. 4 The terrorists responsible for the Sept. 11 attacks may have
communicated over the Internet using a
floppy
pccard
ibutton
USB (et.al.)
Make sure that you keep a working system around so that
when you want/need to use/reuse the key, you can still
get to it.
--bill (who has some data on 7track tape that -REALLY- should be migrated
to something else... like
On Fri, Oct 05, 2001 at 01:22:31PM -0500, Joseph Ashwood wrote:
[ Greate description of M$ ... ]
I am unaware of anything microsoft has ever written
that could be considered secure and there is evidence that they plan
Outlook once offered me the choice between no encryption and
a so called
The original proposal for dot-net was to *centralize* all of the personal
information on at one location. This part may be changing with recent
capitulations regarding, of all things, interoperability. This idea of
centralizing everyone's personal information is the scary part of all this
to
12 matches
Mail list logo