s, but I think I am
still under NDA about that part.)
[EMAIL PROTECTED] | Note to AOL users: for a quick shortcut to reply
Alan Olsen| to my mail, just hit the ctrl, alt and del keys.
"In the future, everything will have its 15 minutes of blame."
But how many people will die before the crooks figure out which systems
have been upgraded and which have not?
[EMAIL PROTECTED] | Note to AOL users: for a quick shortcut to reply
Alan Olsen| to my mail, just hit the ctrl, alt and del keys.
"In the future, everything will have
it "protects" their little
feifdom, they could care less about any of the other effects. (Like
damaged hardware, being unable to use the product with other similar
products, etc.) Very shortsighted attitude. Blinded by greed and
teritorial games.
[EMAIL PROTECTED] | Note to AOL users: for
rs declaring it a "tool for copyright violation".
The market has nothing to do with the situation. This is a case where no
one wants to be the first to stand up and get their corporate heads blown
off.
[EMAIL PROTECTED] | Note to AOL users: for a quick shortcut to reply
Alan Olsen
I need general and/or specific information on the FWZ-1 algorythm. This is used
by the Firewall-1 VPN software.
I have been trying to find details beyond the marketing hype. Wanting to know
just how bad it is beyond "exportable protocol".
Thanks!
--
Alan Olsen
y, an encrypted newsfeed between two sites using a protocol
that generates and discards keys. "Give us the keys and plaintext for these
transactions." "But I don't have the keys." "Give us the plaintext." "That was
expired last week." "Off to jail you go!"
--
Alan Olsen
on your system. This means that we just
have to worry about the software we run. I expect that this will give rise to
programs that will scan binaries looking for the chip ID instructions and
replacing them with nulls or something more "interesting".
--
Alan Olsen
s difficult to use), all of your nyms are viewable to anyone who can snag
your keyring. No passphrase is needed.
This may not be a problem to most users, but to those who use multiple keys,
this can be a serious problem. (Just ask Toto...)
--
Alan Olsen"Carpe Aptenodytes!"
[EMAIL PROTECTED]
> Declan McCullagh wrote:
> > "Child pornographers could distribute their
> > filth unimpeded," the House Permanent
> > Select Committee on Intelligence said.
>
> Doesn't this give the game away a little? What has intelligence to do
>
> At 06:18 PM 9/9/99 -0400, [EMAIL PROTECTED] wrote:
> >On Thu, 9 Sep 1999, Arnold Reinhold wrote:
> >
> >> Are you saying that there are existing encryption programs for the
> >> Pilot or that there are better languages to program it in? (Basic
> >> really isn't bad for something like RC4)
> >
> I guess I should qualify this.
>
> I am more than willing to assume that NAI's relationship with the US
> government is good enough that it got a little head start in obtaining a
> license to offer classic full-strength PGP as "retail" mass-market crypto.
My personal take on
John Gillmore wrote:
> Turning down the offer on verifiability grounds left them wondering
> whether they really would have done it if it'd been possible to keep
> the whole thing secret. The quid pro quo offered by NSA would be that
> their products would have no trouble getting through the (at
Does anyone here have knowledge about a product called V-Go by a company
called Passlogix?
It is supposed to ask as a "passport" program to web sites. It claims to use
128 bit blowfish as the encryption algorithm and use graphically based
passphrase.
The graphically based passphrase seems to
13 matches
Mail list logo