On Wed, 31 Jul 2002, A.Melon wrote:
and on the left hand side of the page it says:
At the moment, we do not support non-Javascript browsers.
If they are concerned about security, Shouldn't they be avoiding
javascript?
Shapiro has a strange love for Javascript. I don't know what that
On Wed, 31 Jul 2002, A.Melon wrote:
and on the left hand side of the page it says:
At the moment, we do not support non-Javascript browsers.
If they are concerned about security, Shouldn't they be avoiding
javascript?
Shapiro has a strange love for Javascript. I don't know what that
This paper is quite interesting and proposes another method of
metering content [1]:
http://citeseer.nj.nec.com/naor98secure.html
It's proposed in the context of web site traffic metering to determine
site traffic rates (for advertising payment or other applications).
It relies on a
On Tue, 30 Jul 2002, James A. Donald wrote:
The plan, already implemented, is to flood file sharing systems with
bogus files or broken files. The solution, not yet implemented, is to
attach digital signatures to files, and have the file sharing software
recognize certain signatures as good
Anonymous wrote:
On Tue, 30 Jul 2002 20:51:24 -0700, you wrote:
When we approve a file, all the people who approved it already get
added to our trust list, thus helping us select files, and we are
told that so and so got added to our list of people who recommend
good files. This gives people
At 11:01 AM 7/31/2002 +0200, Eugen Leitl wrote:
On Tue, 30 Jul 2002, James A. Donald wrote:
The plan, already implemented, is to flood file sharing systems with
bogus files or broken files. The solution, not yet implemented, is to
attach digital signatures to files, and have the file
On Wed, 31 Jul 2002, Steve Schear wrote:
Looks amazingly familiar. Could it be, could be, could it be Mojo
Nation (now MNet http://mnet.sourceforge.net )?
Or OpenCM (http://www.opencm.org)
-Jack
--
On 31 Jul 2002 at 11:01, Eugen Leitl wrote:
The issue of node reputation is completely orthogonal to the
document hashes not colliding. Reputation based systems are
useful, because document URI
http://localhost:4711/f70539bb32961f3d7dba42a9c51442c1218a9100
doesn't say what's in
Leitl
This is completely unnecessary if you address the document with
a cryptohash. An URI like
http://localhost:4711/f70539bb32961f3d7dba42a9c51442c1218a9100
can only adress a particular document.
And then the hollywood hackers flood the system with bogus
descriptions of the content
I proposed a construct which could be used for this application:
called amortizable hashcash.
http://www.cypherspace.org/hashcash/amortizable.pdf
The application I had in mind was also file sharing. (This was
sometime in Mar 2000). I described this problem as the disitrbuted
document
Jack Lloyd wrote:
On Wed, 31 Jul 2002, Steve Schear wrote:
Looks amazingly familiar. Could it be, could be, could it be Mojo
Nation (now MNet http://mnet.sourceforge.net )?
Or OpenCM (http://www.opencm.org)
-Jack
On the OpenCM webpage, it proclaims on the right hand side:
OpenCM
On Tue, 30 Jul 2002, James A. Donald wrote:
The plan, already implemented, is to flood file sharing systems with
bogus files or broken files. The solution, not yet implemented, is to
attach digital signatures to files, and have the file sharing software
recognize certain signatures as good
--
On 29 Jul 2002 at 14:25, Duncan Frissell wrote:
Congressman Wants to Let Entertainment Industry Get Into Your
Computer
Rep. Howard L. Berman, D-Calif., formally proposed
legislation that would give the industry unprecedented new
authority to secretly hack into
On Tue, 30 Jul 2002 20:51:24 -0700, you wrote:
When we approve a file, all the people who approved it already get
added to our trust list, thus helping us select files, and we are
told that so and so got added to our list of people who recommend
good files. This gives people an incentive to
At 11:01 AM 7/31/2002 +0200, Eugen Leitl wrote:
On Tue, 30 Jul 2002, James A. Donald wrote:
The plan, already implemented, is to flood file sharing systems with
bogus files or broken files. The solution, not yet implemented, is to
attach digital signatures to files, and have the file
On Wed, 31 Jul 2002, Anonymous wrote:
Such an approach suffers from the bad guy occasionally signing a
good file, thus placing himself on the trusted signer list.
This assumes a boolean trust metric. What you need is a trust scalar, and
a mechanism to prevent Malory poisoning it. It should
Anonymous wrote:
On Tue, 30 Jul 2002 20:51:24 -0700, you wrote:
When we approve a file, all the people who approved it already get
added to our trust list, thus helping us select files, and we are
told that so and so got added to our list of people who recommend
good files. This gives people
--
On 31 Jul 2002 at 11:01, Eugen Leitl wrote:
The issue of node reputation is completely orthogonal to the
document hashes not colliding. Reputation based systems are
useful, because document URI
http://localhost:4711/f70539bb32961f3d7dba42a9c51442c1218a9100
doesn't say what's in
On Wed, 31 Jul 2002, Steve Schear wrote:
Looks amazingly familiar. Could it be, could be, could it be Mojo
Nation (now MNet http://mnet.sourceforge.net )?
Or OpenCM (http://www.opencm.org)
-Jack
Leitl
This is completely unnecessary if you address the document with
a cryptohash. An URI like
http://localhost:4711/f70539bb32961f3d7dba42a9c51442c1218a9100
can only adress a particular document.
And then the hollywood hackers flood the system with bogus
descriptions of the content
Jack Lloyd wrote:
On Wed, 31 Jul 2002, Steve Schear wrote:
Looks amazingly familiar. Could it be, could be, could it be Mojo
Nation (now MNet http://mnet.sourceforge.net )?
Or OpenCM (http://www.opencm.org)
-Jack
On the OpenCM webpage, it proclaims on the right hand side:
OpenCM
--
On 29 Jul 2002 at 14:25, Duncan Frissell wrote:
Congressman Wants to Let Entertainment Industry Get Into Your
Computer
Rep. Howard L. Berman, D-Calif., formally proposed
legislation that would give the industry unprecedented new
authority to secretly hack into
Congressman Wants to Let Entertainment Industry Get Into Your Computer
Rep. Howard L. Berman, D-Calif., formally proposed
legislation that would give the industry unprecedented new
authority to secretly hack into consumers' computers or knock
them off-line entirely if
On Mon, 29 Jul 2002 14:25:37 -0400 (EDT), you wrote:
Congressman Wants to Let Entertainment Industry Get Into Your Computer
Rep. Howard L. Berman, D-Calif., formally proposed
legislation that would give the industry unprecedented new
authority to secretly hack into
Congressman Wants to Let Entertainment Industry Get Into Your Computer
Rep. Howard L. Berman, D-Calif., formally proposed
legislation that would give the industry unprecedented new
authority to secretly hack into consumers' computers or knock
them off-line entirely if
25 matches
Mail list logo