Friends, colleagues, and co-conspirators,
It has been 17 long years and now the time is finally here to celebrate at
the:
BLIND SIGNATURE PATENT EXPIRATION PARTY
===
WHAT:
A party to celebrate the expiration of the Blind Signature patent.
WHY:
U.S. Patent
the
aluminum case that matters. In principle, any solid case with 6 sides could
be the basis for a FIPS certified device.
--Lucky Green
This message could have been secured by PGP Universal. To secure
future messages from this sender
Universal is 322MB in size and requires a
dedicated x86 server to install.
Have fun,
--Lucky Green [EMAIL PROTECTED]
adding AES support into the CPU.
When was AES last the bottleneck on a general-purpose CPU? The
bottleneck tends to be modular exponentiations, yet VIA failed to
include a modular exponentiation engine. Strange.
--Lucky Green
-Original Message-
From: J.A. Terranson [mailto:[EMAIL PROTECTED]
Sent: Wednesday, October 22, 2003 18:46
To: Lucky Green
Cc: [EMAIL PROTECTED]
Subject: Re: RSA performance on Athlon64 vs. Itanium
On Sun, 12 Oct 2003, Lucky Green wrote:
I just picked up an Athlon64 3200
optimized assembler. That's rather poor performance on the
Athlon64.
Are the figures that I am seeing typical for OpenSSL on the Athlon64?
Has anybody here seen different figures using optimized code?
Thanks,
--Lucky Green
Eugen wrote:
This is dire lunacy. Currently US is perceived as an agressor
by the majority of the world, including the so-called ally
U.K. which has lent more than just its name. You will see an
unprecedented surge in terrorism in the heart of homeland
soon after this campaign is over.
Mindfuq wrote:
I compiling the Mixmaster remailer, I get an error the
OpenSSL was not compiled with IDEA support. However, OpenSSL
was supposed to have compiled with IDEA out of the box, with
only an option to disable it. What am I missing?
You in all likelihood fell victim to some
Thomas Shaddack wrote:
If anything, Twist (or how they changed the name after
T-Mobile took over and screwed with things)
(www.t-mobile.cz), Go (www.eurotel.cz), and Oskarta (Oscard,
www.oskarmobil.cz) prepaid cards are quite common here.
What Swisscom's EasyRoam pre-paid SIMs offered
Anon wrote quoting Tim:
Does my right to control my own property vanish when I
become a shop
or restaurant? How about when I get larger?
Renowned cypherpunk Dave Del Torto thinks it does. This is
the argument that he was using to try to gain admittance to
CodeCon this year, after
Steve wrote quoting:
PAUL KRUGMAN
And though you don't hear much about it in the U.S. media, a
lack of faith
in Mr. Bush's staying power a fear that he will wimp out in
the aftermath
of war, that he won't do what is needed to rebuild Iraq is
a large factor
in the growing rift
or present reader of the Cypherpunks or
similar mailing lists.
--Lucky Green
Declan wrote:
http://fwdepot.com/thestore/product_info.php?products_id=331
http://www.del
trontech.com/Enclosure/E3S/E3S.htm
Interesting, but I'm confused about the Real-time 64-bit/
40-bit DES (Data
Encryption Standard) Encryption/ Decryption with throughput
of 712Mbit/ sec
Does
Steve wrote:
This is totally bogus thinking. The Internet is not broadcast medium.
Information from Web sites must be requested, the equivalent
of ordering a
book or newspaper, for delivery. Under this logic a retailer in one
country, selling a controversial book to someone in another
Adam Stenseth wrote:
Just for my own edification, does this apply to
landline service as well(or other government-sanctioned
monopolies)? For example, are your calling habits and
landline number assets of your phone company? Many of them
seem to think so.
Yes, they are. Just as
Jamie Lawrence wrote:
Jim, you post enough crap from Slashdot to know
differently. People
are doing it. I have a whitebox machine (AMD, 256M ram, cheap TV
card, 20G disk, $300 a year ago) that does it. It isn't a
big deal.
Speaking of posting crap...and don't send me private
Anonymous wrote quoting Lucky:
A reasonable guess, but wrong. The building is a computing and
processing center for Bank of America. That's where your checks go
after
you deposit them at the bank.
The CO for this area is a few blocks away on Mc Coppin. The brick
building with
years.
--Lucky Green
/cvsweb.cgi/src/sys/geom/bde/
Thanks,
--Lucky Green
/
http://www.freebsd.org/cgi/cvsweb.cgi/src/sys/geom/bde/
Thanks,
--Lucky Green
_
MSN 8 with e-mail virus protection service: 2 months FREE*
http://join.msn.com/?page=features/virus
Tim wrote:
Microsoft calls its technology Palladium. Intel dubs it
LaGrande.
I say we call it LaGrab.
Has anybody on the list seen any official specs, datasheets, etc. for
Intel's LaGrande feature set? Any documents that could be donated to
Cryptome's collection? So far, all I have been
James wrote:
Supposedly tens of thousands turned up, forty two thousand in
San Francisco
Yet oddly, the photos of marches that I see look more like
forty in San Francisco, and four hundred in Washington.
Perhaps there were a lot more out of frame, but that is an odd
way to photograph
hashes implemented at the MTA level.
--Lucky Green
What are folks' recommendations here for drive encryption programs under
Windows XP? Must encrypt the entire hard drive, loading before the OS,
and support NTFS. I am in particular interested in first-hand
experiences.
Thanks,
--Lucky Green
being that it is
cheaper to notify law enforcement that the ISP is unable to tap the
information due to the link being encrypted than it is to tap a link.
--Lucky Green
Meyer Wolfsheim wrote:
... just making certain Lucky has seen this gem.
Lucky reads Bugtraq daily. :)
--Lucky Green
of those people will not limit themselves to hypothetical
attacks against The Spec, but will actually test those supposed attacks
on shipping TPMs. Which are readily available in high-end IBM laptops.
--Lucky Green
Gary Jeffers
Sent: Tuesday, August 13, 2002 3:07 PM
To: [EMAIL PROTECTED]
Subject: A faster way to factor prime numbers found?
A faster way to factor prime numbers found?
AFICT, the proposed algorithm is for a test for primality and does not
represent an algorithm to factor composites.
David wrote:
AARG! Anonymous wrote:
His description of how the Document Revocation List could work is
interesting as well. Basically you would have to connect to
a server
every time you wanted to read a document, in order to
download a key to
unlock it. Then if someone decided that
- an application for
an US Patent covering numerous methods by which software applications
can be protected against software piracy on a platform offering the
features that are slated to be provided by Palladium.
--Lucky Green
).
--Lucky Green
invariably lead to other websites
that require the installation of double-byte character sets which I
would not be able to read at any rate.
If you have first-hand experience using a PC Bluetooth adapter with a
Bluetooth headset, please get in touch with me.
TIA,
--Lucky Green
viral
stocks.
I hope they don't try to patent this since I produced prior art for the
in vitro generation of human pathogens from genetic sequences going back
to at least 1995.
To quote Eric Hughes: In the end it is all software.
--Lucky Green
the slightly used nCipher box an even better value. :-)
--Lucky Green
James wrote:
On 11 Jul 2002 at 1:22, Lucky Green wrote:
Trusted roots have long been bought and sold on the
secondary market
as any other commodity. For surprisingly low amounts, you
too can own
a trusted root that comes pre-installed in 95% of all web browsers
deployed.
How
Bill wrote:
At 10:07 PM 06/26/2002 -0700, Lucky Green wrote:
An EMBASSY-like CPU security co-processor would have seriously blown
the part cost design constraint on the TPM by an order of
magnitude or
two.
Compared to the cost of rewriting Windows to have a
infrastructure that can
Hadmut Danisch wrote:
On Wed, Jul 03, 2002 at 10:54:43PM -0700, Bill Stewart wrote:
At 12:59 AM 06/27/2002 -0700, Lucky Green wrote:
I fully agree that the TCPA's efforts offer potentially beneficial
effects. Assuming the TPM has not been compromised, the TPM should
enable to detect
much the intent of the TCPA to permit the use of pseudonymous
credentials for many, if not most, applications. Otherwise, the TCPA's
carefully planned attempts at winning over the online liberty groups
would have been doomed from the start.
--Lucky Green
this mean that one should ignore the
benefits that TCPA might bring? Of course not. But it does mean that one
should carefully weigh the benefits against the risks.
--Lucky Green
, or the public key of the person who licensed the application.
(Other ways to exist but are omitted in the interest of brevity).
--Lucky Green
Bob wrote quoting Mark Hachman:
The whitepaper can not be considered a roadmap to the design
of a Palladium-enabled PC, although it is one practical
solution. The whitepaper was written at around the time the
Trusted Computing Platform Association
(TCPA) was formed in the fall of 2000;
, some questionable, and a lot of them downright
scary.
Sincerely,
--Lucky Green
David wrote:
On Thu, 20 Jun 2002, Greg Newby wrote:
the next couple of days. I'm thinking of a CP
meet Saturday night July 12. Anyone else gonna be there?
I should be there, since I'm free and in the area.
In a similar vein, who's going to be at DEF CON?
I won't be at H2K2, but I
folks in the field. Sure, I know some that could overcome
it, but they may not be willing to do the time for what by then will be
a crime. Come to think of it, doing so already is a crime.
--Lucky Green
Anonymous writes:
Lucky Green writes regarding Ross Anderson's paper at:
Ross and Lucky should justify their claims to the community
in general and to the members of the TCPA in particular. If
you're going to make accusations, you are obliged to offer
evidence. Is the TCPA really
scenarios is the fact the case.
--Lucky Green
Peter wrote:
(Hmm, I wonder if it can be argued that making stuff intended
for public distribution inaccessible violates the creator's
moral rights? I know that doesn't apply in the US, but in
other countries it might work. Moral rights can't be
assigned, so no publisher can take
Ed wrote:
At 07:17 PM 6/2/02, Lucky Green wrote:
In United States v. Cruikshank, 92 U.S. 542 (1876), the
Supreme Court
held that:
...
The right to bear arms is not granted by the Constitution;
neither is
it in any manner dependent upon that instrument for its
existence
Curt wrote:
I concur. The problem is that the most prevalent e-mail
program (Outlook) requires no user intervention as a default
when signing and/or encrypting a message with S/MIME. One
can override the default to High Security (requiring
password) only while the X.509 certificate is
Mike wrote:
And what's to prevent it from happening at a high level if
there's enough profit in it? MPAA is a tiny market compared
to the rest of the electronics industry - it will be easy to
bypass the law on a huge scale. You don't need to be a
sufficiently talented electrical
Mike wrote:
Thanks, that was very enlightening. The URL is good too -
they mention that An electronic signature is defined as being:
an electronic sound, symbol or process attached to or
logically associated with a contract or other record and
executed or adopted by a person
Curt Smith wrote:
It is strange that crypto was a lot more popular back when
cryptography export was heavily controlled. Many people
fought for their crypto rights, but cannot be bothered with
encrypted e-mail. It is similar to securing the right to
vote and then declining to do so.
Peter wrote:
Yup. Actually the no-stored-IV encryption was never designed
to be a non- malleable cipher mode, the design goal was to
allow encryption-with-IV without having to explicitly store
an IV. For PWRI it has the additional nice feature of
avoiding collisions when you use a
Tim wrote:
On Sunday, May 26, 2002, at 10:07 AM, John Young wrote:
Thomas Friedman in the New York Times today:
http://www.nytimes.com/2002/05/26/opinion/26FRIE.html
Webbed, Wired and Worried, May 26, 2002
pose these questions to techies. I found at least some of their
Adam wrote:
Which is too bad. If NAI-PGP went away completely, then
compatability problems would be reduced. I also expect that
the German goverment group currently funding GPG would be
more willing to fund UI work for windows.
Tell me about it. PGP, GPG, and all its variants need to
Meyer Wolfsheim wrote:
NAI is now taking steps to remove the remaining copies of PGP
from the Internet, not long after announcing that the company
will not release its fully completed Mac OS X and Windows XP
versions, and will no longer sell any copies of its PGP software.
Do we still
Peter wrote:
I have seen hard drives which do sector level encryption, and
hook into the bios so that the pw request happens before any
system sw runs. This is a good solution (modulo bios
hacking)[...]
Any such hard drives that I have seen keep the actual encryption key
utilized in
[OK, let me try this again, since we clearly got off on the wrong foot
here. My apologies for overreacting to Damien's post; I have been
receiving dozens of emails from the far corners of the Net over the last
few days that alternatively claimed that I was a stooge of the NSA
because everybody
58 matches
Mail list logo