work on that, instead of
>reinventing the wheel.
IIRC the OpenSSL project was not accepting code from US sources. Has this policy
changed?
--
---------------
William H. Geiger III http://www.openpgp.net
Geiger Consulting
Data Securit
if it looked good
on the bottom line.
A real shame that PGP had to get mixed up with these vipers.
--
-----------
William H. Geiger III http://www.openpgp.net
Geiger ConsultingCooking With Warp 4.0
Author of E-Secure - PGP Front End for
n how bad the random number sources are in most
software, I'd say you are not doing your users a service. --Perry]
-
The following message is forwarded to you by "William H. Geiger III"
<[EMAIL PROTECTED]>
In <[EMAIL PROTECTED]>, on 04/29/99
at 03:40 PM, Anonymous <[EMAIL PROTECTED]> said:
>William H. Geiger III writes:
>> One has to wonder if this is the actions of a company that is trustworthy
>> enough to supply RNG's to the community. IMHO it is not and I s
This reminds me of an AU case a few years back involving their Censorship
Board. IIRC it involved a "book" on shoplifting in which the courts ruled
it's publication was banned. Inadvertently the courts published the book
on the web along with the other documents relating to the cas
e not just security encoding).
--
---------------
William H. Geiger III http://www.openpgp.net
Geiger ConsultingCooking With Warp 4.0
Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http
cting victims or people in federal witness protection programs,
>etc)?
Hi Dave,
The right to anonymous speech has long been upheld by the SC. Sorry don't
have any case references handy but a quick search should turn them up.
--
-----------------
strictions I would guess that 56bit in real time or very close to real
time. 40 bit real time is a no brainer.
--
-----------
William H. Geiger III http://www.openpgp.net
Geiger ConsultingCooking With Warp 4.0
Author of E-Secure - PGP Front En
ay
but they do not stamp the message as above (verification info is displayed
outside of the text window).
Out of band need not be a requirement, like most things it depends on how
it is implemented.
Anyone with any real concern with security would not be using M$ products
to begin with.
--
---
amp; RSADSI may have no problem
selling false security to their customers, IMHO the OpenSSL group should
be above this.
I really think that a quick end could be brought to the export issue if a
few people overseas sued these companies for fraud.
--
--------------
who are trying to use the standards process to increase
sales at the expense of their customers.
--
---
William H. Geiger III http://www.openpgp.net
Geiger ConsultingCooking With Warp 4.0
Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the
y be broken. Doing weak
crypto really fast is not all that impressive to me.
--
-------
William H. Geiger III http://www.openpgp.net
Geiger ConsultingCooking With Warp 4.0
Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
Talk About PGP on IRC EFNet Channel: #pgp Nick: whgiii
Hi Jeff!! :)
---
tify them making their certification worthless.
--
---------------
William H. Geiger III http://www.openpgp.net
Geiger ConsultingCooking With Warp 4.0
Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at:
In <[EMAIL PROTECTED]>, on 07/26/99
at 04:39 PM, Tom Weinstein <[EMAIL PROTECTED]> said:
>"William H. Geiger III" wrote:
>>
>> In <v0421012db3be70faae9c@[207.244.108.87]>, on 07/23/99
>>at 03:20 PM, Robert Hettinga <[EMAIL PROTECT
In <[EMAIL PROTECTED]>, on 07/27/99
at 09:47 AM, Rick Smith <[EMAIL PROTECTED]> said:
>Regarding the general direction of these comments....
>>"William H. Geiger III" wrote:
>>> Well I have my doubts on this. Either they refuse to certify Microsoft
The bitch is getting a clue. :)
--
---------------
William H. Geiger III http://www.openpgp.net
Geiger ConsultingCooking With Warp 4.0
Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 5.0 at: http://www.openpgp.net/pgp.html
Talk About PGP on IRC EFNet Channel: #pgp Nick: whgiii
Hi Jeff!! :)
---
he millions of lines of code that no one
outside of Redmond has ever seen.
Windows is compromised!! Microsoft is in bed with the Federal Government.
There is *no* security on a system running their software. Those who
continue to do so get exactly what they deserve.
--
-----
ould
compromise their systems for the NSA remember Crypto AG & Lotus.
--
-----------
William H. Geiger III http://www.openpgp.net
Geiger ConsultingCooking With Warp 4.0
Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-
gt;after. My personal choice would be to name the building after William
>Jefferson Clinton since he was so closely attentive to the work of the
>FBI for much of his presidential term.
Hey why not, replace the name of one statist with another.
Phil you really should stick to socialist advocac
rights people on how to
>use it in the field...
Hi Dave,
I did some searching through my digital library. Take a look at:
http://www.hedonism.demon.co.uk/paul/solitaire/index.html
--
-----------
William H. Geiger III http://www.openpgp.net
Geige
t, too,
and you are using *that*.
As for their RNG hardware, Paul Kocher was invited to look inside the
Kimono and has published a full report on it, and he didn't find
anything odd... --Perry]
--
---
William H. Geiger III http:
In <[EMAIL PROTECTED]>, on 09/16/99
at 09:20 AM, "William H. Geiger III" <[EMAIL PROTECTED]> said:
>As for their RNG hardware, Paul Kocher was invited to look inside the
>Kimono and has published a full report on it, and he didn't find anything
>odd... -
eep IBM safe from the nightmare Intel faced when it attempted to
>railroad CPU ID numbers on users.
No Code == No Trust!
This has all the security/trust problems that Intel's RNG does and more. I
wouldn't touch this thing with a ten foot poll.
-------
In <[EMAIL PROTECTED]>, on
09/30/99
at 11:39 AM, Damien Miller <[EMAIL PROTECTED]> said:
>-BEGIN PGP SIGNED MESSAGE-
>Hash: SHA1
>On Tue, 28 Sep 1999, William H. Geiger III wrote:
>> In <v04210101b41578834ee3@[204.167.100.139]>, on 09/27/99
&
They will
cave to the LEA's just like all those before them have.
--
---------------
William H. Geiger III http://www.openpgp.net
Geiger ConsultingCooking With Warp 4.0
Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the on
e
different if you were paying VeriSign to provide you with certified
identities of 3rd parties but last I looked this is not the business model
that they are using (nor is any other CA).
--
---
William H. Geiger IIIhttp://www.openpgp.net
Geiger Consulting
Data Security & Cryptology Consulting
Programming, Networking, Analysis
PGP for OS/2: http://www.openpgp.net/pgp.html
---
e
different if you were paying VeriSign to provide you with certified
identities of 3rd parties but last I looked this is not the business model
that they are using (nor is any other CA).
--
---
William H. Geiger IIIhttp://www.openpgp.net
Geiger Consulting
Data Security & Cryptology Consulting
Programming, Networking, Analysis
PGP for OS/2: http://www.openpgp.net/pgp.html
---
the Specification and it supersedes all prior or
contemporaneous oral or written communications, proposals and
representations with respect to the Specification.
--
---
William H. Geiger IIIhttp://www.openpgp.net
Geiger
.
-
The following message is forwarded to you by "William H. Geiger III"
<[EMAIL PROTECTED]> (listed as the From user of this message). The
original sender (see the header, below) was [EMAIL PROTECTED] and
has been set as the "Reply-To&q
29 matches
Mail list logo