Tyler Durden wrote:
An interesting thing to think about is the fact that in dense metro
areas, you pretty much have a star from the CO out to a premise (which
is the cause of deployment of Collapsed SONET Rings). This means the
other photon of your encrypted pair might easily pass through the
Actually, that's an interesting point.
In places like downtown NYC, if the fiber doesn't actually go to the
basement of a building, it will certainly go within a few 100 feet, so that
last hop is trivial. (But the kind of companies this would be targeted for
this would already have fiber to the
At 10:49 AM 10/5/04 -0400, R. A. Hettinga wrote:
Now it looks as if much of the fingerprinting may not have been legal
in
the first place. According to lawyers at the New York Civil Liberties
Union, the city may have violated state law by routinely fingerprinting
arrested protesters.
There is a
Major Variola (ret) wrote:
There is a bill in this year's Ca election to require DNA sampling of
anyone arrested. Not convicted of a felony, but arrested.
Doesn't surprise me - the UK police collected a huge bunch of
fingerprints and dna samples for elimination purposes during one of
the
This is what Tyler Durden [EMAIL PROTECTED] said
about ID Rules Exist, But Can't Be Seen on 30 Sep 2004 at 17:06
For instance, is it indeed possible that revealing this rule would
pose an additional security risk? If such a rule exists (and it does)
then hijackers obviously already know about
For people interested in ecash / credential tech: Stefan Brands book
on his credential / ecash technology is now downloadable in pdf format
from credentica's web site:
http://www.credentica.com/the_mit_pressbook.php
(previously it was only available in hardcopy, and only parts of the
CodeCon 4.0
February 11-13, 2005
San Francisco CA, USA
www.codecon.org
Call For Papers
CodeCon is the premier showcase of cutting edge software development. It
is an excellent opportunity for programmers to demonstrate their work and
keep abreast of what's going on in their community.
All
Dave Howe wrote:
I think this is part of the
purpose behind the following paper:
http://eprint.iacr.org/2004/229.pdf
which I am currently trying to understand and failing miserably at *sigh*
Nope, finally strugged to the end to find a section pointing out that it
does *not* prevent mitm attacks.