--- Forwarded Message
Date: Thu, 17 Aug 2000 13:50:48 -0400
To: [EMAIL PROTECTED]
From: John Young <[EMAIL PROTECTED]>
Subject: MPAA Wins New York DeCSS Case
Judge Kaplan finds for MPAA in 93-page decision:
http://www.nysd.uscourts.gov/courtweb/pdf/D02NYSC/00-08117.PDF
Quote:
p. 89
VI
--- Forwarded Message
Return-Path: [EMAIL PROTECTED]
Message-ID: <[EMAIL PROTECTED]>
From: "Pawling, John" <[EMAIL PROTECTED]>
To: "Pawling, John" <[EMAIL PROTECTED]>
Subject: SFL/CML/ACL/SNACC Freeware Available *NEW CML RELEASE*
Date: Tue, 5 Dec 2000 14:20:30 -0500
Sender: [EMAIL PROTECTE
--- Forwarded Message
Date: Mon, 18 Dec 2000 05:00:09 -0800
To: [EMAIL PROTECTED]
From: Bennett Haselton <[EMAIL PROTECTED]>
Subject: universal censorware-bypass program
[You are receiving this after signing up for membership in Peacefire at
http://www.peacefire.org/join/. To unsubscribe yo
I didn't notice any relevant links in the Register article. A little pokin'
with a search engine yielded..
Welcome to 4C Entity
http://www.dvdcca.org/4centity/
For further (and possibly related) entertainment, see also..
Trusted Computing Platform Alliance
http://www.trustedpc.org/
Reading t
I agree. I lived through the "physical" floppy disk copy-protection wars of
the early 80's (wherein such copy-protection technologies fell out of popular
usage) and am extremely skeptical about whether the market will accept this
stuff for all the reasons you cite.
JeffH
It's also innaresting to note that there's these hints in InterTrust's S-1/A
filed way back in 1999-09-28 (note especially the second two)..
. providers of secure digital distribution technology like AT&T, IBM,
Microsoft, Liquid Audio, Preview Systems, and Xerox;
. providers of hardware
[EMAIL PROTECTED] said:
> If they wern't involved in TCPA before
Well actually, that excerpt of Intertrust's S1 was a listing of potential
competitors in their discussion of risks.
> they are now- they just announced
> a deal with Wave Systems, who is a founder of TCPA.
>
> http://biz.yahoo.co
--- Forwarded Message
Date: Tue, 26 Dec 2000 06:35:10 -0500
To: [EMAIL PROTECTED]
From: Dave Farber <[EMAIL PROTECTED]>
Subject: IP: from Intel RE: IBM&Intel push copy protection into ordinary
disk drives
>From: "Gelsinger, Patrick P" <[EMAIL PROTECTED]>
>To: [EMAIL PROTECTED]
>
>Dave -
>
[EMAIL PROTECTED] said:
> I have found significant information about PKI as it exists today,
> but am looking for some background information. I'm looking for
> information about the history of PKI, how and where it started, how it
> developed, etc.
good question. I don't have an answer offhand
quick semi-newbie question..
[EMAIL PROTECTED] said:
> But if a certified public key can be used for encryption and not just
> signature verification, the corresponding private key must be
> escrowed, and available to law enforcement within an hour of a
> warrant being presented to the CA. Cue
A commonly-held conception in the commercial world (in my experience) is that
most threats to "corporate security" come from the Internet-at-large, and
therefore being behind a firewall is a Good Thing and generally Sufficient.
Of course there are many references in the literature which dispute
So was the Raven list created on 11-Oct-1999 as seems to be the case given
that the..
http://www.ietf.org/mail-archive/working-groups/raven/current/
..archive apparently begins there? (keep clicking on [next page] till it
doesn't work any more)
Does it map to any particular working group or
Original Message
Subject: The title you wanted is "In Print"
Date: Fri, 10 Dec 1999 02:35:31 -0800
From: "Fatbrain.com New Title Notifications" <[EMAIL PROTECTED]>
Dear Keep Me Posted subscriber
It's here!
Rethinking Public Key Infrastructures and Digital Certificates
[EMAIL PROTECTED] said:
> (cf, www.identrus.org)
Seems it's actually www.identrus.com
JeffH
M Roe, "Performance of Symmetric Ciphers and One-way Hash Functions", Fast
Software Encryption 93 pp 83 - 89.
M Roe, "Performance of Block Ciphers and Hash Functions - One Year Later",
Fast Software Encryption 94 pp 359-362.
..or equivalent/similar papers they'd be willing to share?
[these t
I'm curious about what all entropy-gathering gizmos, a la "Entropy Gathering
Deamon" (EGD) http://www.lothar.com/tech/crypto/>, might be available
for/on NT -- anyone know?
My understanding is that such stuff is effectively built-into Win2K -- anyone
have comments/observations on that?
thanks
Ok, now I'm curious about what all entropy-gathering gizmos, a la "Entropy
Gathering Deamon" (EGD) http://www.lothar.com/tech/crypto/> +
/dev/random, might be available for/on Solaris -- anyone know?
Is there something like EGD in the Crypto++ package (yes, we'll grovel thru
it, just thought w
So I'm curious about what all methods do folks currently use (on NT and unix)
to generate a random seed in the case where user interaction (e.g. the ol'
mouse pointer waving or keyboard tapping approaches) isn't a viable option?
thanks,
JeffH
Thanks to everyone for the info -- it's definitely helpful.
Yesterday, I had a brain fart and searched by archive of this list for
"random" and neglected "entropy". This popped up using the latter (slightly
embarrassing that it's in response to a v. similar question I'd asked not long
ago ;).
A search on "randomness" in google.com turns up David's pages as the top two
hits..
http://www.google.com/url?sa=U&start=1&q=http://www.cs.berkeley.edu/~daw/netsc
ape-randomness.html&e=110
http://www.google.com/url?sa=U&start=2&q=http://www.cs.berkeley.edu/~daw/rnd/&e
=110
JeffH
A colleague asked yesterday "I wonder how much Diffie-Hellman is actually
used?", as we were sitting around talking about authentication (in particular)
and security (in general) protocols.
So I'm curious, are there any studies on what is actually deployed "out there"
and/or available in produ
21 matches
Mail list logo