fyi: MPAA Wins New York DeCSS Case

2000-08-18 Thread Jeff . Hodges
--- Forwarded Message Date: Thu, 17 Aug 2000 13:50:48 -0400 To: [EMAIL PROTECTED] From: John Young <[EMAIL PROTECTED]> Subject: MPAA Wins New York DeCSS Case Judge Kaplan finds for MPAA in 93-page decision: http://www.nysd.uscourts.gov/courtweb/pdf/D02NYSC/00-08117.PDF Quote: p. 89 VI

fyi: SFL/CML/ACL/SNACC Freeware Available *NEW CML RELEASE*

2000-12-05 Thread Jeff . Hodges
--- Forwarded Message Return-Path: [EMAIL PROTECTED] Message-ID: <[EMAIL PROTECTED]> From: "Pawling, John" <[EMAIL PROTECTED]> To: "Pawling, John" <[EMAIL PROTECTED]> Subject: SFL/CML/ACL/SNACC Freeware Available *NEW CML RELEASE* Date: Tue, 5 Dec 2000 14:20:30 -0500 Sender: [EMAIL PROTECTE

fyi: universal censorware-bypass program

2000-12-19 Thread Jeff . Hodges
--- Forwarded Message Date: Mon, 18 Dec 2000 05:00:09 -0800 To: [EMAIL PROTECTED] From: Bennett Haselton <[EMAIL PROTECTED]> Subject: universal censorware-bypass program [You are receiving this after signing up for membership in Peacefire at http://www.peacefire.org/join/. To unsubscribe yo

Re: IBM&Intel push copy protection into ordinary disk drives

2000-12-22 Thread Jeff . Hodges
I didn't notice any relevant links in the Register article. A little pokin' with a search engine yielded.. Welcome to 4C Entity http://www.dvdcca.org/4centity/ For further (and possibly related) entertainment, see also.. Trusted Computing Platform Alliance http://www.trustedpc.org/ Reading t

Re: About Gilmore's letter on IBM&Intel push copy protection into ordinary disk drives

2000-12-22 Thread Jeff . Hodges
I agree. I lived through the "physical" floppy disk copy-protection wars of the early 80's (wherein such copy-protection technologies fell out of popular usage) and am extremely skeptical about whether the market will accept this stuff for all the reasons you cite. JeffH

Re: IBM&Intel push copy protection into ordinary disk drives

2000-12-22 Thread Jeff . Hodges
It's also innaresting to note that there's these hints in InterTrust's S-1/A filed way back in 1999-09-28 (note especially the second two).. . providers of secure digital distribution technology like AT&T, IBM, Microsoft, Liquid Audio, Preview Systems, and Xerox; . providers of hardware

Re: IBM&Intel push copy protection into ordinary disk drives

2000-12-22 Thread Jeff . Hodges
[EMAIL PROTECTED] said: > If they wern't involved in TCPA before Well actually, that excerpt of Intertrust's S1 was a listing of potential competitors in their discussion of risks. > they are now- they just announced > a deal with Wave Systems, who is a founder of TCPA. > > http://biz.yahoo.co

fyi: IP: from Intel RE: IBM&Intel push copy protection into ordinary

2000-12-26 Thread Jeff . Hodges
--- Forwarded Message Date: Tue, 26 Dec 2000 06:35:10 -0500 To: [EMAIL PROTECTED] From: Dave Farber <[EMAIL PROTECTED]> Subject: IP: from Intel RE: IBM&Intel push copy protection into ordinary disk drives >From: "Gelsinger, Patrick P" <[EMAIL PROTECTED]> >To: [EMAIL PROTECTED] > >Dave - >

Re: Historical PKI resources

2001-01-08 Thread Jeff . Hodges
[EMAIL PROTECTED] said: > I have found significant information about PKI as it exists today, > but am looking for some background information. I'm looking for > information about the history of PKI, how and where it started, how it > developed, etc. good question. I don't have an answer offhand

Re: DCSB: Risk Management is Where the Money Is; Trust in Digital Comm

1998-11-13 Thread Jeff . Hodges
quick semi-newbie question.. [EMAIL PROTECTED] said: > But if a certified public key can be used for encryption and not just > signature verification, the corresponding private key must be > escrowed, and available to law enforcement within an hour of a > warrant being presented to the CA. Cue

Internal vs external threats, any references?

1999-10-01 Thread Jeff . Hodges
A commonly-held conception in the commercial world (in my experience) is that most threats to "corporate security" come from the Internet-at-large, and therefore being behind a firewall is a Good Thing and generally Sufficient. Of course there are many references in the literature which dispute

Re: IP: IETF considers building wiretapping into the Internet

1999-10-14 Thread Jeff . Hodges
So was the Raven list created on 11-Oct-1999 as seems to be the case given that the.. http://www.ietf.org/mail-archive/working-groups/raven/current/ ..archive apparently begins there? (keep clicking on [next page] till it doesn't work any more) Does it map to any particular working group or

"Rethinking Public Key Infrastructures" now available @FatBrain

1999-12-10 Thread Jeff Hodges
Original Message Subject: The title you wanted is "In Print" Date: Fri, 10 Dec 1999 02:35:31 -0800 From: "Fatbrain.com New Title Notifications" <[EMAIL PROTECTED]> Dear Keep Me Posted subscriber It's here! Rethinking Public Key Infrastructures and Digital Certificates

Re: starting up servers that need access to secrets

2000-01-06 Thread Jeff . Hodges
[EMAIL PROTECTED] said: > (cf, www.identrus.org) Seems it's actually www.identrus.com JeffH

does anyone have electronic copies of..

2000-01-07 Thread Jeff . Hodges
M Roe, "Performance of Symmetric Ciphers and One-way Hash Functions", Fast Software Encryption 93 pp 83 - 89. M Roe, "Performance of Block Ciphers and Hash Functions - One Year Later", Fast Software Encryption 94 pp 359-362. ..or equivalent/similar papers they'd be willing to share? [these t

Entropy-gathering gizmos for NT?

2000-03-29 Thread Jeff . Hodges
I'm curious about what all entropy-gathering gizmos, a la "Entropy Gathering Deamon" (EGD) http://www.lothar.com/tech/crypto/>, might be available for/on NT -- anyone know? My understanding is that such stuff is effectively built-into Win2K -- anyone have comments/observations on that? thanks

Entropy-gathering gizmos for Solaris?

2000-04-18 Thread Jeff . Hodges
Ok, now I'm curious about what all entropy-gathering gizmos, a la "Entropy Gathering Deamon" (EGD) http://www.lothar.com/tech/crypto/> + /dev/random, might be available for/on Solaris -- anyone know? Is there something like EGD in the Crypto++ package (yes, we'll grovel thru it, just thought w

random seed generation without user interaction?

2000-06-05 Thread Jeff . Hodges
So I'm curious about what all methods do folks currently use (on NT and unix) to generate a random seed in the case where user interaction (e.g. the ol' mouse pointer waving or keyboard tapping approaches) isn't a viable option? thanks, JeffH

Re: random seed generation without user interaction?

2000-06-06 Thread Jeff . Hodges
Thanks to everyone for the info -- it's definitely helpful. Yesterday, I had a brain fart and searched by archive of this list for "random" and neglected "entropy". This popped up using the latter (slightly embarrassing that it's in response to a v. similar question I'd asked not long ago ;).

doh! shoulda used google [random, randomness, entropy]

2000-06-06 Thread Jeff . Hodges
A search on "randomness" in google.com turns up David's pages as the top two hits.. http://www.google.com/url?sa=U&start=1&q=http://www.cs.berkeley.edu/~daw/netsc ape-randomness.html&e=110 http://www.google.com/url?sa=U&start=2&q=http://www.cs.berkeley.edu/~daw/rnd/&e =110 JeffH

actual deployment of various PK & Key-exchange algorthms?

2000-07-27 Thread Jeff . Hodges
A colleague asked yesterday "I wonder how much Diffie-Hellman is actually used?", as we were sitting around talking about authentication (in particular) and security (in general) protocols. So I'm curious, are there any studies on what is actually deployed "out there" and/or available in produ