[EMAIL PROTECTED] ,good work!
--- Tim May [EMAIL PROTECTED] wrote:
On Wednesday, October 8, 2003, at 06:16 AM, Sarad
AV wrote:
hi,
If we are to convert a k-bit integer n to a base b
number,it takes us O(log n) if the base b is a
power
of 2.
eg. converting (1)base to base
It took less than a decade for EFF to make a full turn, from championing
unrestricted uses of technology to censoring who can do what and in which way.
In this regards EFF resembles technological empires - like Cisco, for example,
that get born because of radically new ways to do things and then
I've always had trouble with FreeS/WAN breaking at kernel
upgrades, but now that 2.6 is coming we're getting native
IPsec support (albeit FreeS/WAN seems to claim Opportunistic
Encryption won't be supported?).
We seem to have a curious situation here. The majority
of systems out there now support
[Permission is granted to repost this document in its entirety, without
other limitation. See http://invisiblog.com/1c801df4aee49232/ for an
online copy.]
The EFF has published a report on the Promise and Risk of Trusted
Computing at http://www.eff.org/Infra/trusted_computing/20031001_tc.php.
also sprach Eugen Leitl [EMAIL PROTECTED] [2003.10.09.1129 +0200]:
Are there technical reasons for this situation? If yes, what is
required to enable IPsec default interoperability at least with
open source OSses?
A curious idea that I've been paying some attention to for a while.
One could
On Thu, Oct 09, 2003 at 06:57:33PM +0200, martin f krafft wrote:
A curious idea that I've been paying some attention to for a while.
One could simply implement a means that tries to connect with IPsec
by default and falls back to IP if unsuccessful (keeping a cache of
That's how Opportunistic
[I wonder what if any effect this might have on crypto patents, e.g.,
Chaumian blinding?]
The European Parliament's decision to limit patents... risks creating a
patent war with a fallout that could make it illegal to access some
European e-commerce sites from the United States...
Pure
also sprach Eugen Leitl [EMAIL PROTECTED] [2003.10.09.1931 +0200]:
What is wrong which just exchanging the keys for ad hoc mode? You could
cache
them and log whenever a key has changed (at least allowing to detect a MITM
post facto).
.. like SSH, huh?
We're really looking for blanket rollout