-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Mon, Oct 16, 2000 at 05:57:25PM -0400, David Honig wrote:
At 01:37 AM 10/16/00 -0400, Nathan Saper wrote:
On Sun, Oct 15, 2000 at 07:11:19PM -0700, James A.. Donald wrote:
Have you been sealed in a box the last ten years? Companies may
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Mon, Oct 16, 2000 at 11:53:26PM -0400, Steve Furlong wrote:
"Riad S. Wahby" wrote:
Nathan Saper [EMAIL PROTECTED] wrote:
Huh? Tarquin Fintimlinbin-Whinbimlim-Bus Stop F'Tang F'Tang Olé
Biscuit-Barrel?
Uh, what?
This
At 12:27 AM -0700 10/17/00, Kerry L. Bonin wrote:
And yet ciphers are a significant target of the NSA. Sure, they devote
significant resources to exploiting weaknesses in key management, but
ciphers are a primary target.
Many people who discuss the capabilities of the NSA do not use proper
At 8:50 PM -0700 on 10/16/00, Nathan Saper wrote:
I'm not claiming
to be stating facts.
Ah.
:-).
Cheers,
RAH
--
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
"...
At 10:07 PM -0700 on 10/16/00, Bill Stewart wrote regarding the "somebody
oughta" problem:
You shouldn't have to search back more than a month
...at any point in time...
:-).
Cheers,
RAH
--
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting
At 01:18 AM 10/17/00 -0700, Tim May wrote:
For a message encrypted (or signed, a related problem) with a PKS
cipher, recovering the plaintext involves factoring the modulus...so
far as we know. This factoring may be done with conventional
computers, special-purpose computers, or even exotic
I just checked the Legal Status of the GEMA -
http://www.gema.de/eng/
GEMA is a "eingetragener Verein" (registered Club) and has no
direct association with the state. But there is the
"Urheberrechtswahrnehmungsgesetz", sometimes called Lex GEMA.
It basically says that you have to proof to GEMA
An invitation
fairyisis ([EMAIL PROTECTED]) has invited you to join the Power Promotion SmartGroup.
Joining
To join the group and see the calendar of events, documents, pictures, questionnaires and group emails to register on the web- OR -Send a reply to this message
Cypherpunks works like any anarchy. *You're* running cypherpunks.
If you want something done the way you want it done, *do it*
and get other people to help you.
Also, given that the list has been around for almost a decade,
and has archives, you might consider seeing if it's been discussed.
You
Nathan Saper wrote:
Even if they do (which I haven't heard of, but I could be wrong), the
trend right now is more corporate power, less governmental power. As
I said before, we are already seeing this trend, what with
corporations able to circumvent countries' environmental codes and
Since no timely announcement from usual sources was detected,
why not meet in San Francisco, Golden Gate Park, 9th and Lincoln,
create an ad hoc agenda and beat it till dinner time.
On Mon, Oct 16, 2000 at 09:46:25PM -0700, Nathan Saper wrote:
Fine. My basis for my claim is that the NSA is the best funded and
best equiped electronic intelligence agency in the world, and they
have employed some of the smartest people in the world.
Sorry, but this is hand-waving. There
Dear cryptopunk0,
Welcome to NYTimes.com!
We are delighted that you have decided to become a member of our community.
As a member you now have complete access to the Web's premier source for
news and information -- free of charge.
NYTimes.com not only provides you with in-depth coverage of
Could a factoring breakthrough happen to convert this exptime problem
to polynomial time? Maybe. I said as much. Is it likely? See
discussions on progress toward proving factoring to be NP-hard (it
hasn't been proved to be such, though it is suspected to be so, i.e.,
that there will never
Kerry L. Bonin writes:
Most people who have worked with military crypto systems do, off the
record. The difference between what is public and what has
been developed
with decades of unlimited resources is staggering. How many
cryptographers
or discrete math experts work in the public
On Tue, 17 Oct 2000, Kerry L. Bonin wrote:
Extrapolate capabilities from the EFF DES crack project and you are
somewhat closer (1536 ASIC w/ 24 cores/ASIC yielded 4.52 days/crack of 56
bit keyspace), then take into consideration the advantages of using more
sophisticated semiconductor
At 4:37 PM -0700 10/16/2000, Ed Gerck wrote:
Borrowing from a private comment from Bob Jueneman, whatever the technical
community decides that non-repudiation means, it probably isn't what the legal
community means. So be it. Certainly the legal profession uses
ordinary English
words to mean
Here is a link to the text:
http://thomas.loc.gov/cgi-bin/query/D?c106:1:./temp/~c106Eno3vf::
Thanks!
-p
"Those who would give up essential liberty for temporary safety deserve
neither liberty nor safety" - Benjamin Franklin, 1759
Mac Norton [EMAIL PROTECTED]@cyberpass.net on 10/16/2000
At 11:58 AM 10/16/00 -0700, Joshua R. Poulson wrote:
Isn't utterly obvious that the NSA, just any decent person,
compartmentalizes its security so that if one system were
broken, the other systems would not necessarily be broken?
Very well said. They also benefit from security via obscurity
At 10:06 AM 10/17/00 -0500, Fisher Mark wrote:
It is just a whole lot easier to do a black-bag job on a North Korean
embassy (for example) than to directly attack their crypto. That is why
defense companies do background checks, that is why some areas of military
facilities are guarded by
At 08:24 AM 10/17/00 -0700, Ray Dillinger wrote:
On Tue, 17 Oct 2000, Kerry L. Bonin wrote:
Extrapolate capabilities from the EFF DES crack project and you are
somewhat closer (1536 ASIC w/ 24 cores/ASIC yielded 4.52 days/crack of 56
bit keyspace), then take into consideration the advantages
At 10:24 AM -0700 10/17/00, Ray Dillinger wrote:
Basically, whether it's math or crypto, there are some ideas that
people just aren't going to "get" because they always lump unfamiliar
things together if those things violate the same assumption.
In math, they used to look at me blankly when I
On 17 Oct 2000, Matt Curtin wrote:
With all of the people running around claiming that data which are
pseudonymous are actually anonymous, it's no wonder that there's so
much confusion.
http://www.consumerreports.org/Special/ConsumerInterest/Reports/0005pri1.htm
Trying to point out the
At 10:22 AM -0700 10/17/00, Kerry L. Bonin wrote:
At 08:24 AM 10/17/00 -0700, Ray Dillinger wrote:
That totals 14 orders of magnitude (and I think that's generous).
So use keys that are six bytes longer than a "reasonable" opponent
could crack. problem solved. 2048-bit RSA is still way out
NSA released today on its Web site two reports on
its reorganization, one by an external team of 27 page,
another of 76 pages by an internal team. Both are big
PDF files. We have converted the first to HTML:
http://cryptome.org/nsa-reorg-et.htm (77KB)
Here is an excerpt:
"We interviewed
- Original Message -
From: John Young [EMAIL PROTECTED]
The question occurs: did PK crypto get leaked on purpose?
How was it done?
It may not be exactly what you had in mind, but I personally _observed_ the
"leak" (to the public) of RSA, but I simply didn't recognize what it was at
The bibliography of another NSA reorganization report
released today lists several entries under "Unified
Cryptologic Architecture" as well as a "U.S. Cryptologic
Strategy - Preparing for the 21st Century."
There is also a citation of "SINEWS - GCHQ Modernization
and Change Program."
We would
On Tue, 17 Oct 2000, Jordan Dimov wrote:
Could a factoring breakthrough happen to convert this exptime problem
to polynomial time? Maybe. I said as much. Is it likely? See
discussions on progress toward proving factoring to be NP-hard (it
hasn't been proved to be such, though it is
At 1:33 PM -0700 10/17/00, Ray Dillinger wrote:
On Tue, 17 Oct 2000, John Galt wrote:
Cypherpunks is archived? Isn't that against what most cypherpunks stand
for? I know it sets up a "style fingerprint" attack against anonymity...
Do you imagine for an instant that a list like this could go
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Tue, Oct 17, 2000 at 12:50:36AM -0700, petro wrote:
Hash: SHA1
On Mon, Oct 16, 2000 at 05:57:25PM -0400, David Honig wrote:
At 01:37 AM 10/16/00 -0400, Nathan Saper wrote:
On Sun, Oct 15, 2000 at 07:11:19PM -0700, James A.. Donald wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Tue, Oct 17, 2000 at 02:30:10PM +0200, Tom Vogt wrote:
Nathan Saper wrote:
Even if they do (which I haven't heard of, but I could be wrong), the
trend right now is more corporate power, less governmental power. As
I said before, we are
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Tue, Oct 17, 2000 at 10:38:57AM -0400, Declan McCullagh wrote:
On Mon, Oct 16, 2000 at 09:46:25PM -0700, Nathan Saper wrote:
Fine. My basis for my claim is that the NSA is the best funded and
best equiped electronic intelligence agency in
http://www.cluebot.com/article.pl?sid=00/10/18/042235mode=nested
Gore and Bush: Equal-Opportunity Censors?
posted by cicero on Tuesday October 17, @10:58PM
from the affirmative-action-for-censorhappy-politicos dept.
There was something absent from this evening's presidential
http://www.wired.com/news/politics/0,1283,39301,00.html
The Mother of Gore's Invention
by Declan McCullagh ([EMAIL PROTECTED])
3:00 a.m. Oct. 17, 2000 PDT
WASHINGTON -- If it's true that Al Gore created the Internet, then I
created the "Al Gore created the Internet"
Yes, I can see it now.
"I'm sorry I have to tell you this Mr. Mrs. May, but the
genetic tests required by your insurance company have revealed that your unborn
child has a 65% chance of developing an expensive to treat and possibly severely
debilitating condition requiring many operations,
Could a factoring breakthrough happen to convert this exptime problem
to polynomial time? Maybe. I said as much. Is it likely? See
discussions on progress toward proving factoring to be NP-hard (it
hasn't been proved to be such, though it is suspected to be so, i.e.,
that there will never be
Cypherpunks is archived? Isn't that against what most cypherpunks stand
for? I know it sets up a "style fingerprint" attack against anonymity...
It probably is, but it's also against what most cypherpunks
stand for to tell them what to do with the bits that hit their
network card.
--
Merkle does not seem to be the kind of person who either would be
working for the NSA or whom the NSA would pick to be a conduit for
leaked secrets.
3. Ditto in spades for Whit Diffie. And Martin Hellman was, at that
time, an active anti-war activist ("Beyond War"). Seems unlikely
that NSA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Tue, Oct 17, 2000 at 06:48:48PM -0700, Tim May wrote:
On Mon, 16 Oct 2000, [iso-8859-1] Ing. Fausto C.G. wrote:
I dont now where did you get my e-mail, but I am
receiving spam from you. Stop it right now, please, I
didnt ask
P.S. I too would be interested in documented cases where DNA
collected by the police was given to insurance companies.
It's (apparently) England where there is wide spread DNA
collection for use in finding certain types of criminals.
In England both the Police and the Health
--
At 12:34 PM 10/17/2000 -0700, Tim May wrote:
3. Ditto in spades for Whit Diffie. And Martin Hellman was, at that
time, an active anti-war activist ("Beyond War"). Seems unlikely
that NSA would pick them.
To put this in simple terms. A smart person with a modest computer,
familiar
Title: Make $1,000 a day selling information products on your own website
THE BEST DEAL ON THE NET
BAR NONE !
Nothing offered on the Internet even comes close, at any price.
Dear Entrepreneur:
Hi, I'm Dave London. I spent a year and thousands of dollars developing the most
42 matches
Mail list logo