Re: Is There a Visor Security Model?

1999-09-22 Thread Dan Geer
The Palm's security model is, by most accounts I've seen, non-existant. The issue is the lack of memory protection, i.e., that there is no protected space for keying material. Visor is said to use the PalmOS as is, so that is not a magic wand. Of course, if your OS has no memory protection

Re: Good crypto products?

1999-09-22 Thread Jay Holovacs
If you are running W95/98, try Scramdisk. It creates a virtual drive in a fully encrypted (your choice of algorithm) binary file (which can be stego'd if desired). Files are opened and saved to this disk, Explorer, recycle, etc. works like any regular disk drive. http://www.scramdisk.clara.net/i

Re: having source code for your CPU chip -- NOT

1999-09-22 Thread Arnold Reinhold
First of all, I've always thought that Thompson's paper was excessively defeatist. It should be possible to bootstrap an open source C++ compiler from a simple C subset and then have several grouts independently produce subset C compilers in assembler code. Or compile it on ancient machines, e

Re: Ecash without a mint, or - making anonymous payments practical

1999-09-22 Thread amir . herzberg
Anonymous says, > It is still worth considering how to create anonymous payment systems > which could be more compatible with other elements of present day society. I think we can do this, indeed, we can achieve an even stronger goal: a payment mechanism that will support anonymous payments fo

IP: Pentagon gets 'smart'

1999-09-22 Thread Robert Hettinga
--- begin forwarded text From: "Dan S" <[EMAIL PROTECTED]> To: "isml" <[EMAIL PROTECTED]> Subject: IP: Pentagon gets 'smart' Date: Tue, 21 Sep 1999 22:47:07 -0400 Sender: [EMAIL PROTECTED] Reply-To: "Dan S" <[EMAIL PROTECTED]> >From CNN, http://cnn.com/TECH/computing/9909/21/pentagon.smart.car

Re: Is There a Visor Security Model?

1999-09-22 Thread Bill Frantz
At 8:23 PM -0700 9/21/99, Dan Geer wrote: >The Palm's security model is, by most accounts I've seen, non-existant. > >The issue is the lack of memory protection, i.e., that there is no >protected space for keying material. Visor is said to use the PalmOS >as is, so that is not a magic wand.

Re: having source code for your CPU chip -- NOT

1999-09-22 Thread Bill Frantz
At 9:15 PM -0700 9/21/99, Arnold Reinhold wrote: >First of all, I've always thought that Thompson's paper was >excessively defeatist. It should be possible to bootstrap an open >source C++ compiler from a simple C subset and then have several >grouts independently produce subset C compilers in ass

Re: Good crypto products?

1999-09-22 Thread David Vincenzetti
On Tue, Sep 21, 1999 at 10:35:48AM -0500, David Hayes wrote: > On Mon, Sep 20, 1999 at 12:41:41PM -0700, Rob Lemos wrote: > > Can anyone recommend a good product for encrypting information on the fly, > > meaning encrypt the file when you close it and decrypt it when you open it. > > You don't sp

Re: Is There a Visor Security Model?

1999-09-22 Thread James H. Cloos Jr.
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 > "Bill" == Bill Frantz <[EMAIL PROTECTED]> writes: Bill> The other solution is to run you Palm in "system high" mode, Bill> where all applications are trusted. (Since the only application Bill> I have added to my Palm is "Life", I could easily

FC00 SUBMISSION DEADLINE REMINDER

1999-09-22 Thread Robert Hettinga
--- begin forwarded text Resent-Date: Wed, 22 Sep 1999 03:34:16 -0400 Date: Wed, 22 Sep 1999 09:34:05 +0200 (MET DST) From: Ray Hirschfeld <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Subject: FC00 SUBMISSION DEADLINE REMINDER Reply-to: [EMAIL PROTECTED] Resent-From: [EMAIL PROTECTED] Resent-Sende

KISA Attack

1999-09-22 Thread Robert Hettinga
--- begin forwarded text Date: Wed, 22 Sep 1999 05:25:40 -0400 To: [EMAIL PROTECTED] From: John Young <[EMAIL PROTECTED]> Subject: KISA Attack Sender: [EMAIL PROTECTED] Reply-To: John Young <[EMAIL PROTECTED]> For the past two days jya.com has been under attack by the Korea Information Securit

Re: KISA Attack

1999-09-22 Thread John R Levine
> For the past two days jya.com has been under attack > by the Korea Information Security Agency > > http://www.kisa.or.kr > > which has set up (or allowed) a couple of robots to issue a > sustained flood of requests for the same three files, one per > second, which has nearly stopped acces