AARG!Anonymous <[EMAIL PROTECTED]> writes:
> Be sure and send a note to the Gnutella people reminding them of all
> you're doing for them, okay, Lucky?
Do the Gnutella people share your feelings on this matter? I'd be
surprised.
--
__ Paul Crowley
\/ o\ [EMAIL PROTECTED]
/\__/ http://www.ci
On Friday 09 August 2002 12:23 pm, Barney Wolff <[EMAIL PROTECTED]>wrote:
> Does anybody offer a public MD5 web service? Though if your omnipotent
> attacker sits between you and the world, this does no good.
For the hell of it, I knocked together this:
http://www.scytale.com/cgi-bin/md5.cgi
AARG!Anonymous wrote:
> Adam Back writes:
>
>
>>- Palladium is a proposed OS feature-set based on the TCPA hardware
>>(Microsoft)
>
>
> Actually there seem to be some hardware differences between TCPA and
> Palladium. TCPA relies on a TPM, while Palladium uses some kind of
> new CPU mode. Pa
Actually, our group at Dartmouth has an NSF "Trusted Computing"
grant to do this, using the IBM 4758 (probably with a different
OS) as the hardware.
We've been calling the project "Marianas", since it involves a chain of
islands.
--Sean
>If only there were a technology in which clients coul
Adam Back wrote:
[...]
> - It is always the case that targetted people can have hardware
> attacks perpetrated against them. (Keyboard sniffers placed during
> court authorised break-in as FBI has used in mob case of PGP using
> Mafiosa [1]).
[...]
> [1] "FBI Bugs Keyboard of PGP-Using Alleged
> It reminds me of an even better way for a word processor company to make
> money: just scramble all your documents, then demand ONE MILLION DOLLARS
> for the keys to decrypt them. The money must be sent to a numbered
> Swiss account, and the software checks with a server to find out when
> the
I'm genuinely sorry, but I couldn't resist this...
At 12:35 PM -0400 on 8/11/02, Sean Smith wrote:
> Actually, our group at Dartmouth has an NSF "Trusted Computing"
> grant to do this, using the IBM 4758 (probably with a different
> OS) as the hardware.
>
> We've been calling the project "Maria
i guess it's appropriate that the world's deepest
hole is next to something labelled a "trust territory" :)
--Sean
:)
-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTEC
At 11:09 PM 8/7/02 +, David Wagner wrote:
>John Kelsey wrote:
>>a. If my input samples have enough entropy to make my outputs random, then
>>I need to resist computationally unbounded attackers. (Otherwise, why
>>bother with distilling entropy; just use a PRNG.)
>>
>>b. If my input samples