Chris Palmer [EMAIL PROTECTED] writes:
James A. Donald writes:
Further, genuinely secure systems are now becoming available, notably
Symbian.
What does it mean for Symbian to be genuinely secure? How was this determined
and achieved?
By executive fiat.
Peter.
Chris Palmer [EMAIL PROTECTED] writes:
James A. Donald writes:
Further, genuinely secure systems are now becoming available, notably
Symbian.
What does it mean for Symbian to be genuinely secure? How was this determined
and achieved?
By executive fiat.
Peter.
Gregory Hicks [EMAIL PROTECTED] writes:
As for applying for one now, I think the deadline for the non-RFID passwords
is about 3 days away (31 Oct 2005), but I could be wrong. (In other words, if
your application is not in processing by 31 Oct, then you get the new,
improved, RFID passport.)
Ahh,
Gregory Hicks [EMAIL PROTECTED] writes:
As for applying for one now, I think the deadline for the non-RFID passwords
is about 3 days away (31 Oct 2005), but I could be wrong. (In other words, if
your application is not in processing by 31 Oct, then you get the new,
improved, RFID passport.)
Ahh,
http://www.bluegemsecurity.com/ claims that they can encrypt data from the
keyboard to the web browser, bypassing trojans and sniffers, however the web
pages are completely lacking in any detail on what they're actually doing.
From reports published by West Coast Labs, it's a purely software-only
http://www.bluegemsecurity.com/ claims that they can encrypt data from the
keyboard to the web browser, bypassing trojans and sniffers, however the web
pages are completely lacking in any detail on what they're actually doing.
From reports published by West Coast Labs, it's a purely software-only
http://cgi.ebay.com/SAIC-V2-Military-Portable-Computer-With-Accessories_W0QQitemZ8707782870QQcategoryZ177QQrdZ1QQcmdZViewItem
May possibly run a very cut-down version of Linux, otherwise you'd be stuck
with DOS.
Peter.
http://cgi.ebay.com/SAIC-V2-Military-Portable-Computer-With-Accessories_W0QQitemZ8707782870QQcategoryZ177QQrdZ1QQcmdZViewItem
May possibly run a very cut-down version of Linux, otherwise you'd be stuck
with DOS.
Peter.
During a recent discussion about secure crypto device bootstrap and
attestation capabilities, I realised that of the three devices for which this
was implemented and for which documentation was available (Fortezza, IBM 4758,
and Dallas Crypto iButton), I either don't have any documentation for the
During a recent discussion about secure crypto device bootstrap and
attestation capabilities, I realised that of the three devices for which this
was implemented and for which documentation was available (Fortezza, IBM 4758,
and Dallas Crypto iButton), I either don't have any documentation for the
From a private mailing list, therefore anonymised. A European visitor to the
US is describing going through the US immigation procedure. His comment on
the fingerprinting process:
I waited at that moment for messages like freedom is slavery
The response:
Ignorance is strength already
From a private mailing list, therefore anonymised. A European visitor to the
US is describing going through the US immigation procedure. His comment on
the fingerprinting process:
I waited at that moment for messages like freedom is slavery
The response:
Ignorance is strength already
DiSToAGe [EMAIL PROTECTED] writes:
it seems now intel say there is no DRM in there chips.
No, it's very careful to say that there is no *unannounced* DRM in their
chips, in the same way that we have had no undetected penetrations of our
security.
Peter.
http://news.yahoo.com/news?tmpl=storyu=/ap/20050607/ap_on_re_us/chain_saw_border
Man With Chain Saw Allowed to Enter U.S.
On April 25, Gregory Despres arrived at the U.S.-Canadian border crossing at
Calais, Maine, carrying a homemade sword, a hatchet, a knife, brass knuckles
and a chain
http://news.yahoo.com/news?tmpl=storyu=/ap/20050607/ap_on_re_us/chain_saw_border
Man With Chain Saw Allowed to Enter U.S.
On April 25, Gregory Despres arrived at the U.S.-Canadian border crossing at
Calais, Maine, carrying a homemade sword, a hatchet, a knife, brass knuckles
and a chain
DiSToAGe [EMAIL PROTECTED] writes:
it seems now intel say there is no DRM in there chips.
No, it's very careful to say that there is no *unannounced* DRM in their
chips, in the same way that we have had no undetected penetrations of our
security.
Peter.
Jay Listo [EMAIL PROTECTED] writes:
I am also not aware of any products or PKIs that use SPKI certs. I would
really appreciate if someone could refer me to instances of actual usage of
SPKI certs.
They were never really used. The great feature of SPKI is that it's not X.509
(so it's a design
Jay Listo [EMAIL PROTECTED] writes:
I am also not aware of any products or PKIs that use SPKI certs. I would
really appreciate if someone could refer me to instances of actual usage of
SPKI certs.
They were never really used. The great feature of SPKI is that it's not X.509
(so it's a design
We were somewhere around Barstow on the edge of the desert when the drugs
began to take hold.
The following was my variant on this from a few years ago, representing the
56th IETF PKIX meeting minutes. Note that this is from the book form, not the
film version of the text:
-- Snip --
We were
R.A. Hettinga [EMAIL PROTECTED] forwarded:
Briefly, it works like this: point A transmits an encrypted message to point
B. Point B can decrypt this, if it knows the password. The decrypted text is
then sent back to point A, which can verify the decryption, and confirm that
point B really does
We were somewhere around Barstow on the edge of the desert when the drugs
began to take hold.
The following was my variant on this from a few years ago, representing the
56th IETF PKIX meeting minutes. Note that this is from the book form, not the
film version of the text:
-- Snip --
We were
R.A. Hettinga [EMAIL PROTECTED] forwarded:
Briefly, it works like this: point A transmits an encrypted message to point
B. Point B can decrypt this, if it knows the password. The decrypted text is
then sent back to point A, which can verify the decryption, and confirm that
point B really does
Barry Shein [EMAIL PROTECTED] writes:
Eventually email will just collapse (as it's doing) and the RBOCs et al will
inherit it and we'll all be paying 15c per message like their SMS services.
And the spammers will be using everyone else's PC's to send out their spam, so
the spam problem will
Barry Shein [EMAIL PROTECTED] writes:
Eventually email will just collapse (as it's doing) and the RBOCs et al will
inherit it and we'll all be paying 15c per message like their SMS services.
And the spammers will be using everyone else's PC's to send out their spam, so
the spam problem will
Erwann ABALEA [EMAIL PROTECTED] writes:
I've read your objections. Maybe I wasn't clear. What's wrong in installing a
cryptographic device by default on PC motherboards? I work for a PKI 'vendor',
and for me, software private keys is a nonsense.
A simple crypto device controlled by the same
Tyler Durden [EMAIL PROTECTED] writes:
That chip...is it likely to be an ASIC or is there already such a thing as
a security network processor? (ie, a cheaper network processor that only
handles security apps, etc...)
Or could it be an FPGA?
Neither. Currently they've typically been
Tyler Durden [EMAIL PROTECTED] writes:
That chip...is it likely to be an ASIC or is there already such a thing as
a security network processor? (ie, a cheaper network processor that only
handles security apps, etc...)
Or could it be an FPGA?
Neither. Currently they've typically been
Steve Furlong [EMAIL PROTECTED] writes:
I tried, years before _UC_ came out, to get some friends to name their
daughter Chlamydia. They didn't know what the word meant, but for some reason
didn't trust my advice. Nor did they like Pudenda.
One of the characters in Hercules Returns is called
R.A. Hettinga [EMAIL PROTECTED] forwarded:
Promoting implanted RFID devices as a security measure is downright 'loco,'
says Katherine Albrecht. Advertising you've got a chip in your arm that
opens important doors is an invitation to kidnapping and mutilation.
Since kidnapping is sort of an
Steve Furlong [EMAIL PROTECTED] writes:
I tried, years before _UC_ came out, to get some friends to name their
daughter Chlamydia. They didn't know what the word meant, but for some reason
didn't trust my advice. Nor did they like Pudenda.
One of the characters in Hercules Returns is called
R.A. Hettinga [EMAIL PROTECTED] forwarded:
Promoting implanted RFID devices as a security measure is downright 'loco,'
says Katherine Albrecht. Advertising you've got a chip in your arm that
opens important doors is an invitation to kidnapping and mutilation.
Since kidnapping is sort of an
Tyler Durden [EMAIL PROTECTED] writes:
Anyone know from first-hand experience about cellphone jammers?
I need...
1) A nice little portable, and
Try the SH066PL, a nice portable that looks exactly like a cellphone, it's one
of the few portables I know of.
2) A higher-powered one that can black
Tyler Durden [EMAIL PROTECTED] writes:
Anyone know from first-hand experience about cellphone jammers?
I need...
1) A nice little portable, and
Try the SH066PL, a nice portable that looks exactly like a cellphone, it's one
of the few portables I know of.
2) A higher-powered one that can black
ken [EMAIL PROTECTED] writes:
James A. Donald wrote:
So far the Pentagon has
shattered the enemy while suffering casualties of about a thousand,
which is roughly the same number of casualties as the British empire
suffered doing regime change on the Zulu empire - an empire of a
quarter of a
ken [EMAIL PROTECTED] writes:
James A. Donald wrote:
So far the Pentagon has
shattered the enemy while suffering casualties of about a thousand,
which is roughly the same number of casualties as the British empire
suffered doing regime change on the Zulu empire - an empire of a
quarter of a
James A. Donald [EMAIL PROTECTED] writes:
I find this very hard to believe. Post links, or give citations.
Normally I'd dig up various refs, but since this topic has been beaten to
death repeatedly in places like soc.history.medieval, and the debate could
well go on endlessly in the manner of
James A. Donald [EMAIL PROTECTED] writes:
I find this very hard to believe. Post links, or give citations.
Normally I'd dig up various refs, but since this topic has been beaten to
death repeatedly in places like soc.history.medieval, and the debate could
well go on endlessly in the manner of
James A. Donald [EMAIL PROTECTED] writes:
Peter Gutmann wrote:
Nobles expected to surrender to other nobles and be ransomed.
Commoners didn't respect this, and almost never took prisoners.
Henry's orders didn't make that much difference, at best they were a
we'll turn a blind eye notification
R.A. Hettinga [EMAIL PROTECTED] writes:
These were not the sort of sporting arrows skillfully shot toward gayly
colored targets by Victorian archery societies (charmingly described by Mr.
Soar in later chapters) but heavy bodkin pointed battle shafts that went
through the armor of man and horse.
[EMAIL PROTECTED] (=?iso-8859-1?Q?Tiarn=E1n_=D3_Corr=E1in?=) writes:
The Russians (for example) conquered Hitler's capital, Berlin. And I believe
the Russian zone in Germany was larger than any of the others, reflecting the
fact that Stalin bore most of entire burden of defeating Germany,
R.A. Hettinga [EMAIL PROTECTED] writes:
These were not the sort of sporting arrows skillfully shot toward gayly
colored targets by Victorian archery societies (charmingly described by Mr.
Soar in later chapters) but heavy bodkin pointed battle shafts that went
through the armor of man and horse.
[EMAIL PROTECTED] (=?iso-8859-1?Q?Tiarn=E1n_=D3_Corr=E1in?=) writes:
The Russians (for example) conquered Hitler's capital, Berlin. And I believe
the Russian zone in Germany was larger than any of the others, reflecting the
fact that Stalin bore most of entire burden of defeating Germany,
James A. Donald [EMAIL PROTECTED] writes:
But it is hardly a matter of holding out. So far the Pentagon has
shattered the enemy while suffering casualties of about a thousand,
We're talking about different things, the War on Bogeymen vs. the War for Oil.
In its war on bogeymen, the most notable
James A. Donald [EMAIL PROTECTED] writes:
But it is hardly a matter of holding out. So far the Pentagon has
shattered the enemy while suffering casualties of about a thousand,
We're talking about different things, the War on Bogeymen vs. the War for Oil.
In its war on bogeymen, the most notable
R.A. Hettinga [EMAIL PROTECTED] writes:
Germany 1944 does not equal USA 2004, no matter how hard you twist the
kaleidoscope.
Fighting an unwinnable war always seems to produce the same type of rhetoric,
whether it's the war on some drugs, the war on anyone Bush doesn't like, or
the war on
Eugen Leitl [EMAIL PROTECTED] writes:
On Tue, Nov 02, 2004 at 08:16:41AM -0500, R. A. Hettinga wrote:
http://online.wsj.com/article_print/0,,SB109936293065461940,00.html
No cypherpunks content. Just local politics.
And it's not even original, they've mostly just translated it into English,
R.A. Hettinga [EMAIL PROTECTED] writes:
At 3:32 AM +1300 11/3/04, Peter Gutmann wrote:
Eugen Leitl [EMAIL PROTECTED] writes:
On Tue, Nov 02, 2004 at 08:16:41AM -0500, R. A. Hettinga wrote:
http://online.wsj.com/article_print/0,,SB109936293065461940,00.html
No cypherpunks content. Just local
R.A. Hettinga [EMAIL PROTECTED] writes:
Germany 1944 does not equal USA 2004, no matter how hard you twist the
kaleidoscope.
Fighting an unwinnable war always seems to produce the same type of rhetoric,
whether it's the war on some drugs, the war on anyone Bush doesn't like, or
the war on
Eugen Leitl [EMAIL PROTECTED] writes:
On Tue, Nov 02, 2004 at 08:16:41AM -0500, R. A. Hettinga wrote:
http://online.wsj.com/article_print/0,,SB109936293065461940,00.html
No cypherpunks content. Just local politics.
And it's not even original, they've mostly just translated it into English,
R.A. Hettinga [EMAIL PROTECTED] writes:
At 3:32 AM +1300 11/3/04, Peter Gutmann wrote:
Eugen Leitl [EMAIL PROTECTED] writes:
On Tue, Nov 02, 2004 at 08:16:41AM -0500, R. A. Hettinga wrote:
http://online.wsj.com/article_print/0,,SB109936293065461940,00.html
No cypherpunks content. Just local
John Young [EMAIL PROTECTED] writes:
Generously, the US government offers a complete set of photos,
drawings, process diagrams and descriptions for an RDX manufacturing
plant. Library of Congress has the info in its Historic American
Engineering Record.
It's not all too hard to make from
John Young [EMAIL PROTECTED] writes:
Generously, the US government offers a complete set of photos,
drawings, process diagrams and descriptions for an RDX manufacturing
plant. Library of Congress has the info in its Historic American
Engineering Record.
It's not all too hard to make from
Alan Barrett [EMAIL PROTECTED] writes:
On Tue, 12 Oct 2004, John Kelsey wrote:
but there doesn't seem to be a clean process for determining how
skilled an attacker needs to be to, say, scan my finger once, and
produce either a fake finger or a machine for projecting a fake
fingerprint into the
http://www.nzherald.co.nz/storydisplay.cfm?storyID=3600794thesection=newsthesubsection=general
Ease off says air security boss
15.10.2004
Security on domestic flights is too strict and should be downgraded, says the
head of the Aviation Security Service.
General manager Mark Everitt, a former
Looks like you can mess up voting even if there is a paper trail. These are
paper votes that are electronically counted, so the problem was in the
electronic processing, not the actual voting procedure.
Alan Barrett [EMAIL PROTECTED] writes:
On Tue, 12 Oct 2004, John Kelsey wrote:
but there doesn't seem to be a clean process for determining how
skilled an attacker needs to be to, say, scan my finger once, and
produce either a fake finger or a machine for projecting a fake
fingerprint into the
http://www.nzherald.co.nz/storydisplay.cfm?storyID=3600794thesection=newsthesubsection=general
Ease off says air security boss
15.10.2004
Security on domestic flights is too strict and should be downgraded, says the
head of the Aviation Security Service.
General manager Mark Everitt, a former
Looks like you can mess up voting even if there is a paper trail. These are
paper votes that are electronically counted, so the problem was in the
electronic processing, not the actual voting procedure.
R. A. Hettinga [EMAIL PROTECTED] writes:
NEWARK, Sept. 30 - Laetitia Bohn walked into Newark Liberty International
Airport on Thursday, dazed and sleepy after an eight-hour flight from Paris,
and was jolted from her reverie when an immigration officer asked for her
photograph and fingerprints
Steve Furlong [EMAIL PROTECTED] writes:
On Sun, 2004-10-03 at 05:18, Peter Gutmann wrote:
The US now has the dubious distinction of being more obnoxious to get through
the borders than the former East Germany (actually even without this measure,
the checks had become at least as obnoxious
R. A. Hettinga [EMAIL PROTECTED] writes:
NEWARK, Sept. 30 - Laetitia Bohn walked into Newark Liberty International
Airport on Thursday, dazed and sleepy after an eight-hour flight from Paris,
and was jolted from her reverie when an immigration officer asked for her
photograph and fingerprints
Steve Furlong [EMAIL PROTECTED] writes:
On Sun, 2004-10-03 at 05:18, Peter Gutmann wrote:
The US now has the dubious distinction of being more obnoxious to get through
the borders than the former East Germany (actually even without this measure,
the checks had become at least as obnoxious
Major Variola (ret) [EMAIL PROTECTED] writes:
AN is extremely deliquescent; perhaps the sulphate was for that?
No, it was specifically required as a desensitiser by the European nitrogen
cartel, since they felt the pure nitrate was too dangerous for processing into
fertiliser.
Removing chunks
J.A. Terranson [EMAIL PROTECTED] writes:
Wow! I had no idea ammonium nitrate (ANFO for all intents and purposes,
yes?) could produce that kind of result! How much was there?
4,500 tons, of which only 10% detonated.
(The nitrate was desensitised with ammonium sulfate and stored outside,
Eugen Leitl [EMAIL PROTECTED] writes:
About 4.5 kT of 50:50 ammonium nitrate/ammonium sulfate mix. One of the
largest, if not *the* largest nonnuclear explosions ever.
The largest man-made explosion is usually claimed to be Halifax (about 3000
tons of assorted HE's), but there are a pile of
J.A. Terranson [EMAIL PROTECTED] writes:
Wow! I had no idea ammonium nitrate (ANFO for all intents and purposes,
yes?) could produce that kind of result! How much was there?
4,500 tons, of which only 10% detonated.
(The nitrate was desensitised with ammonium sulfate and stored outside,
Globalwin has just introduced an external hard drive enclosure
(http://www.htpcnews.com/main.php?id=dorri_1) with built-in 40-bit DES
encryption (and if it's the HW I think it is, that's 40-bit DES in ECB mode,
and the vendor generates the key for you).
Peter.
The threats on New York, New Jersey and Washington DC serve as a reminder
that the terrorists are among us here at home.
He went on to remind citizens to stay alert, trust no-one, and keep their
lasers handy.
Peter.
Eugen Leitl [EMAIL PROTECTED] writes:
Assuming I generate a key on a RSA smart card made by GD, what kind of
prestige track do these people have?
They seem to be pretty secretive, that's not a good sign.
GD produce (or help produce) things like banknotes and passports (and have
been doing so
Eugen Leitl [EMAIL PROTECTED] writes:
I have no smart card background, unfortunately. I've heard GD ignores
requests from open source developer people, though.
Yup. It's standard banking-industry stuff, unless you're a large
bank/government/whatever and are prepared to sign over your firstborn
The threats on New York, New Jersey and Washington DC serve as a reminder
that the terrorists are among us here at home.
He went on to remind citizens to stay alert, trust no-one, and keep their
lasers handy.
Peter.
Eugen Leitl [EMAIL PROTECTED] writes:
Assuming I generate a key on a RSA smart card made by GD, what kind of
prestige track do these people have?
They seem to be pretty secretive, that's not a good sign.
GD produce (or help produce) things like banknotes and passports (and have
been doing so
Eugen Leitl [EMAIL PROTECTED] writes:
I have no smart card background, unfortunately. I've heard GD ignores
requests from open source developer people, though.
Yup. It's standard banking-industry stuff, unless you're a large
bank/government/whatever and are prepared to sign over your firstborn
Justin [EMAIL PROTECTED] writes:
HOUSTON (Reuters) - Law enforcement officials said on Monday they are looking
for a man seen taking pictures of two refineries in Texas City, Texas.
At Usenix Security a few years back, we [a bunch of random security people,
most of whom were foreign nationals]
Tyler Durden [EMAIL PROTECTED] writes:
*: A year or two ago someone posted about the blow up of Texas City back in
the early 1950s.
1947.
Apparently, some kind of tanker hit something else and set of a chain
reaction killing thousands and wiping out the town
After several earlier events (the
Justin [EMAIL PROTECTED] writes:
HOUSTON (Reuters) - Law enforcement officials said on Monday they are looking
for a man seen taking pictures of two refineries in Texas City, Texas.
At Usenix Security a few years back, we [a bunch of random security people,
most of whom were foreign nationals]
Tyler Durden [EMAIL PROTECTED] writes:
*: A year or two ago someone posted about the blow up of Texas City back in
the early 1950s.
1947.
Apparently, some kind of tanker hit something else and set of a chain
reaction killing thousands and wiping out the town
After several earlier events (the
Thomas Shaddack [EMAIL PROTECTED] writes:
There are many various embedded computers available on the market, eg. the
one from http://www.gumstix.com/. (Question for the crowd: anybody knows
other comparable or better Linux-ready affordable embedded computer
solutions?)
When I investigated this a
Thomas Shaddack [EMAIL PROTECTED] writes:
There are many various embedded computers available on the market, eg. the
one from http://www.gumstix.com/. (Question for the crowd: anybody knows
other comparable or better Linux-ready affordable embedded computer
solutions?)
When I investigated this a
Tyler Durden [EMAIL PROTECTED] writes:
If they took out a few key COs downtown one morning the effect on the economy
would be significant.
It depends on what your goal is. As someone else on this list pointed out,
terrorism is just another form of PR. If OBL took out (say) that huge ATT CO
in
Tyler Durden [EMAIL PROTECTED] writes:
If they took out a few key COs downtown one morning the effect on the economy
would be significant.
It depends on what your goal is. As someone else on this list pointed out,
terrorism is just another form of PR. If OBL took out (say) that huge ATT CO
in
Anonymous [EMAIL PROTECTED] writes:
But asymm warfare has to accomplish its goal. It's not being very
successful.
It's been extraordinarily successful. The US is driving itself (and a lot of
the rest of the world) nuts with terrorists-under-the-beds paranoia. I
recently saw a replay of some
At 01:53 AM 6/25/2004, Eugen Leitl wrote:
The transcription rules for furriner names are strict, too.
No Phn'glui M'gl wna'f, Cthulhu R'lyeh Wgha Nagl Ftaghn for you.
Just as well. They'd probably make you fill the form out in triplicate,
In his house at R'lyeh, dead Cthulhu waits knitting? I
At 01:53 AM 6/25/2004, Eugen Leitl wrote:
The transcription rules for furriner names are strict, too.
No Phn'glui M'gl wna'f, Cthulhu R'lyeh Wgha Nagl Ftaghn for you.
Just as well. They'd probably make you fill the form out in triplicate,
In his house at R'lyeh, dead Cthulhu waits knitting? I
I presume most people have by now read Cringely's piece on hacked Linux for
Linksys WRT54G (and clones):
[...]
It does VoIP, prioritizes traffic, has currently VPN pass-through and will do
IPsec on future mesh-supporting firmware.
You forgot to mention sometimes it'll stay up for as long as
I presume most people have by now read Cringely's piece on hacked Linux for
Linksys WRT54G (and clones):
[...]
It does VoIP, prioritizes traffic, has currently VPN pass-through and will do
IPsec on future mesh-supporting firmware.
You forgot to mention sometimes it'll stay up for as long as
R. A. Hettinga [EMAIL PROTECTED] forwarded:
So now the NSA's secret is out. The Iranians have undoubtedly changed
their encryption machines, and the NSA has lost its source of Iranian
secrets. But little else is known. Who told Chalabi? Only a few
people would know this important U.S. secret,
R. A. Hettinga [EMAIL PROTECTED] forwarded:
So now the NSA's secret is out. The Iranians have undoubtedly changed
their encryption machines, and the NSA has lost its source of Iranian
secrets. But little else is known. Who told Chalabi? Only a few
people would know this important U.S. secret,
There's an interesting look at the situation in Iraq from the point of view of
a third-party contractor, in an article in the Sunday Star Times,
http://www.stuff.co.nz/stuff/sundaystartimes/0,2106,2908644a6442,00.html.
Most quotable quote:
The thing that pisses us off is the Yanks had no idea
Major Variola (ret) [EMAIL PROTECTED] writes:
PS: what happens if your passport's chip doesn't work? Do you get sent back
and the airline fined $10K? Do you wait extra time while the still-readable
passport number indexes your record online? How much extra time? (Anyone
have experience with
Major Variola (ret) [EMAIL PROTECTED] writes:
PS: what happens if your passport's chip doesn't work? Do you get sent back
and the airline fined $10K? Do you wait extra time while the still-readable
passport number indexes your record online? How much extra time? (Anyone
have experience with
Eugen Leitl [EMAIL PROTECTED] writes:
A way that works would involve passphrase-locked keyrings, and forgetful
MUAs (this mutt only caches the passphrase for a preset time).
A way that works *in theory* would involve The chances of any vendor
of mass-market software shipping an MUA where
R. A. Hettinga [EMAIL PROTECTED] writes:
If we really do get cryptographic signatures on email in a way that works,
expect 80% of all spam to be blown away as a matter of course.
I think you mean:
If we really do get cryptographic signatures on email in a way that works,
expect 80% of all
Eugen Leitl [EMAIL PROTECTED] writes:
A way that works would involve passphrase-locked keyrings, and forgetful
MUAs (this mutt only caches the passphrase for a preset time).
A way that works *in theory* would involve The chances of any vendor
of mass-market software shipping an MUA where
R. A. Hettinga [EMAIL PROTECTED] writes:
If we really do get cryptographic signatures on email in a way that works,
expect 80% of all spam to be blown away as a matter of course.
I think you mean:
If we really do get cryptographic signatures on email in a way that works,
expect 80% of all
Trei, Peter [EMAIL PROTECTED] writes:
I'll be in the SF/SJ area the week of the RSA conference. Anyone interested
in getting together for dinner one night?
Do these things actually get organised? I thought you just bump into other
Cpunks via the usual Brownian motion and at some point someone
Eugen Leitl [EMAIL PROTECTED] writes:
On Fri, Feb 13, 2004 at 04:36:56PM +0100, Thomas Shaddack wrote:
FCC recently mandated fees for Internet radio broadcasters, based on the
You're hailing from .cz, me from .de. Of what relevance is FCC to us?
The RIAA/MPAA and US govt.are working on that.
I just noticed that ABIT have a nice uATX motherboard with a built-in Cavium
crypto engine capable of processing up to 400Mbps of IPSec traffic or 3,500
RSA operations per second. Details at
http://www.abit-usa.com/products/servers/products.php?categories=4model=69.
Peter.
Nomen Nescio [EMAIL PROTECTED] writes:
After WWI the winners humiliated the loosers badly. This is one of the main
reasons Hitler came to power and got support from the Germans for the
aggressions that started the war. He managed to use these feelings of being
treated as dogs and paying to heavy
Nomen Nescio [EMAIL PROTECTED] writes:
After WWI the winners humiliated the loosers badly. This is one of the main
reasons Hitler came to power and got support from the Germans for the
aggressions that started the war. He managed to use these feelings of being
treated as dogs and paying to heavy
1 - 100 of 226 matches
Mail list logo