Re: RSA Conference, and BA Cypherpunks
Cool, and dinner much better for this sort of thing imho; but Wedn. is also taken. So I vote for Tuesday evening dinner/pub thing. Best, Amir Herzberg Trei, Peter wrote: Once again, the RSA Conference is upon us, and many of the corrospondents on these lists will be in San Francisco. I'd like to see if anyone is interested in getting together. We've done this before. At past conferences, we've had various levels of participation, from 50 down to 3. Since the BAC Physical Meetings seem to have pretty well died out, I'd like to propose that those of us who are interested get together for lunch or dinner at some point. I'll be arriving on site Monday afternoon, and leaving Friday morning. Thursday night, at least, is already spoken for. At the moment, it looks like Monday or Tuesday night may be the best, though a lunch is also possible. Any takers? Peter Trei [EMAIL PROTECTED] RSA Data Security Conference Dates: Feb 14-18 2005 Place: Moscone Center, San Francisco http://www.rsaconference.com While the full conference is rather expensive, note that you can get a free Expo pass if you register online by 5pm Feb 14th. - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED] .
Re: Identity thieves can lurk at Wi-Fi spots
R.A. Hettinga wrote: http://www.usatoday.com/tech/news/2005-02-06-evil-twin-usat_x.htm The facility uses software and sensors to monitor 480 wireless devices used by medical personnel at 110 access points. Last month, it stopped about 120 attempts to steal financial information from medical personnel and patients - double the number of incidents from a few months earlier. The recent surge in evil-twin attacks parallels phishing scams ... Has anyone seen any case details on any of these attacks? The few articles I read all seemed to start out saying it was happening, and then ended with limp descriptions of how it *could* happen. That is, more FUD. The above though seems to be a claim that it has happened. Now, what exactly did happen? Was it a hack attack? An eavesdropping attack? An MITM? Was there indeed even an attack, or was it just the software indicating a couple of funny connects? Last year, those 2 kids were caught doing the wireless thing in front of the hardware store - but again, what they did was to hack (well, walk) into the systems and install a program. iang, still on the trail of the elusive MITM... -- News and views on what matters in finance+crypto: http://financialcryptography.com/