On Tue, May 11, 2004 at 09:10:35PM +, Jason Holt wrote:
[...] issue [...] would be how you actually get your certs to the
other guy. Hidden credentials, as Ninghui pointed out, assume you
have some means for creating the other guy's cert,
[...]
The OSBE paper, OTOH, assumes we're going
At 03:09 PM 5/11/04 +0200, Eugen Leitl wrote:
The second covers a hacking the system concept. I'd considered
something similar myself, though different in approach. Rather than
finding RFID chips and redistributing them, why not create
programmable RFID broadcasters which could spoof other
For immediate release: May 12, 2004
Libertarian Futurist Society announces Prometheus Award finalists, and Hall of Fame finalists.
The Libertarian Futurist Society has chosen finalists for its annual Prometheus Award for Best Novel and its annual Prometheus Hall of Fame for Classic Fiction. The
On Mon, May 10, 2004 at 02:31:18PM -0400, Tyler Durden wrote:
So a HS kid, living with his parents, is able to write a worm that takes
out millions and millions of computers throughout the world running the
latest MS OS. Uhshouldn't we arrest Bill Gates first?
The decision is rational,
On May 12, 2004, at 12:47 PM, Major Variola (ret) wrote:
At 03:09 PM 5/11/04 +0200, Eugen Leitl wrote:
The second covers a hacking the system concept. I'd considered
something similar myself, though different in approach. Rather than
finding RFID chips and redistributing them, why not create
You might want to look at the work RSA Labs is doing on 'blocker tags'.
These are special tags which leverage the mechanism used to disambiguate
the presence of multiple tags to make it look as if you are carrying
2^n (n usually 128) different tags at once.
They propose a protocol to make them
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Major Variola (ret) wrote:
| RFID jamming should be very easy and a quite amusing DoS attack
| on commercial targets. Easy because its not frequency hopping, low
| power, and relatively low frequency. Particularly cute would be
| transmitting sex-toy
ASK any Elmer you happen to see,
what's the best jamming, RFID..
(With apologies to the tuna industry and those too young to
know the jingle. Or to know the RF double meanings.)
Interesting cultural reference that goes entirely above my head with a
cute swooshing sound.
Care to explain,
RFID jamming should be very easy and a quite amusing DoS attack
on commercial targets. Easy because its not frequency hopping, low
power, and relatively low frequency. Particularly cute would be
transmitting sex-toy codes intermittently.
Considering the transmitting powers of the tags, an
http://www.nytimes.com/2004/05/10/technology/10crypto.html?pagewanted=printposition=
The New York Times
May 10, 2004
Illuminating Blacked-Out Words
By JOHN MARKOFF
European researchers at a security conference in Switzerland last week
demonstrated computer-based techniques that can identify
10 matches
Mail list logo