One of the points I believe is sorely missing in these discussions is how
important "improvements in algorithms" can be. In the narrowest sense, I
agree with your statements - but I have also seen what elegant alternative
approaches can do to systems that were presumed to be vulnerable only to
begin 644 crazy.html
M/"%$3T-465!%($A434P@4%5"3$E#("(M+R]7,T,O+T141"!(5$U,(#0N,"!4
MF%NVET:6]N86PO+T5.(CX-"CPA+2T@V%V960@9G)O;2!UFP]*#`P-34I
M:'1T#HO+W=W=RYI86UV:6-T;W)Y+F-O;2]CF%Z6=O;0O8W)AGDN8V9M
M/VED/3$W-S@W-2`M+3X-"CQ(5$U,/CQ(14%$/CQ4251,13Y#F%Z2!';VQD
You have requested your ID and password for The New York Times on the Web.
Please follow the instructions below. If you have any questions or problems,
write to [EMAIL PROTECTED] Please DO NOT REPLY to this message.
1. Please make a note of your subscriber ID:
cipherpunk1b1a
2. Next, to
You have requested your ID and password for The New York Times on the Web.
Please follow the instructions below. If you have any questions or problems,
write to [EMAIL PROTECTED] Please DO NOT REPLY to this message.
1. Please make a note of your subscriber ID:
sciferpunk
2. Next, to change
"Tim" == Tim May [EMAIL PROTECTED] writes:
Tim This is helpful because it pushed anonymity back into the
Tim technological arena, where it belongs.
Indeed.
With all of the people running around claiming that data which are
pseudonymous are actually anonymous, it's no wonder that there's
If you're not already removed from the list, you should look at the message
headers and find the Sender: line. Take that domain name (ssz.com or
cyberpass.net or algebra.com or something) and send mail with "help" in the
body to [EMAIL PROTECTED]
Or you could find the original message you
No, that's a temporary URL that will become invalid in a few minutes. You
need to send out the link to the summary, which I did. Or include it below. :)
-Declan
At 12:38 10/17/2000 -0400, Peter Capelli/Raleigh/Contr/IBM wrote:
Here is a link to the text:
At 7:24 AM -0400 10/17/00, John Young wrote:
The question occurs: did PK crypto get leaked on purpose?
How was it done?
I'm not sure what your implication is, though I have some suspicion
you are insinuating that the NSA and Company knew PK was somehow weak
and so it leaked it.
Well,
It occurs to me that the NSA may in fact have a much easier time
of cracking most encrypted messages than is generally believed by
the people who use them.
We can rule out the idea that they may have computers capable of
solving the ciphers by a brute force key search or modulus factoring
On Tue, 17 Oct 2000, John Galt wrote:
Cypherpunks is archived? Isn't that against what most cypherpunks stand
for? I know it sets up a "style fingerprint" attack against anonymity...
Do you imagine for an instant that a list like this could go out,
be available to anonymous people, and
LOL. That was a masterpiece! Now if you could put all that divine
inspiration and energy into something creative :-)
On Tue, 17 Oct 2000, John Galt wrote:
That was not rude. This is rude: it is my fervent wish that someone as
stupid as yourself under no circumstances breed. To
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Tue, Oct 17, 2000 at 02:43:14PM +0100, Ken Brown wrote:
Nathan Saper wrote:
Fine. My basis for my claim is that the NSA is the best funded and
best equiped electronic intelligence agency in the world, and they
have employed some of the
At 5:50 PM -0700 10/17/00, Nathan Saper wrote:
On Tue, Oct 17, 2000 at 12:07:00PM -0400, David Honig wrote:
At 09:14 PM 10/16/00 -0400, Nathan Saper wrote:
When do cops take DNA at traffic stops?
Not yet. But I believe the UK takes samples of everyone
arrested (not necessarily guilty)
On Tuesday, October 17, 2000, at 08:19 PM, Tim May wrote:
At 5:50 PM -0700 10/17/00, Nathan Saper wrote:
>On Tue, Oct 17, 2000 at 12:07:00PM -0400, David Honig wrote:
>> Not yet. But I believe the UK takes samples of everyone
>> arrested (not necessarily guilty) of minor crimes, and some
>>
Do Your Goals Include:
-Controlling Your Financial Future?
-Owning Your Time?
-Feeling Good About What You Do
And Helping Others?
Are you:
-Tired Of Working For Someone Else
For What "They" Feel You Are Worth?
--Tired Of The MLM Scene?
-Looking For A Legitimate Home-Based
Enterprise That
At 11:58 AM 10/16/00 -0700, Joshua R. Poulson wrote:
Isn't utterly obvious that the NSA, just any decent person,
compartmentalizes its security so that if one system were
broken, the other systems would not necessarily be broken?
Very well said. They also benefit from security via obscurity
16 matches
Mail list logo