>
> Well, the totally trivial and stupid thing is for a list reader to
> sign a message saying "I think message X is spam" and send it to the list
Sorry, I re-read your message and noted the requirement to ahve no central
server. How about this:
1) To post a message, sender S takes a 2
On Sat, 13 Jan 2001, Ray Dillinger wrote:
> list don't think this is spam?" and yes/no buttons. The
> subscribers just have another little button on their mail
> reader - So it goes Next message, delete, reply, reply all,
> spam.
Well, the totally trivial and stupid thing is for a list re
On Fri, 12 Jan 2001, David Honig wrote:
>the server could simply use a voting protocol to get (or timeout)
>permission to do proposed actions. We are assuming that the server
>is trusted, right?
Actually, no. That creates a single priveleged machine, which is
also a point of failure, whi
-=|[ duuh... ]|=-
"NONSTOP" is moreso a protocol and general criteria for operations. It is
not soley restricted to physical, TEMPEST, hij/abduct, intel, crypto, or
any other specific protection mechanism.
NONSTOP is more a general idea and concept, with implications and
implementations across a
On Fri, 12 Jan 2001, David Honig wrote:
> (Thinking out loud) Maybe the actions require access to a distributed
> N-of-M database? How do you prevent someone from reusing the
> reconstructed database? Or uncooperatives refusing to update their slice
> of the DB?
One way to address this pr
At 10:56 PM 1/12/01 -0500, Declan McCullagh wrote:
>David's suggestion makes sense to me. But if NONSTOP is a codeword, it
>would be classified at least secret, and manufacturers of such
>products would be discouraged by their customers at NSA from labeling
>their products with such a name.
>
>-De
David's suggestion makes sense to me. But if NONSTOP is a codeword, it
would be classified at least secret, and manufacturers of such
products would be discouraged by their customers at NSA from labeling
their products with such a name.
-Declan
On Fri, Jan 12, 2001 at 07:47:00PM -0500, David Ho
Jim,
I remember that whole Faraday cage discussion - it was painful.
When it comes to E&M you're really off in the tall grass.
Mike
At 06:01 PM 1/12/01 -0500, Ray Dillinger wrote:
>
>Crucial facts about a protocol that does the right thing would be:
>
>1) DOES NOT create any single priveleged user or machine.
>
>2) Resistant to denial-of-service attacks and attempts to
> "stack the vote." (Requires user authentication)
>
At 12:32 PM 1/12/01 -0500, Tim May wrote:
>
>The Tandem Computers "NONSTOP" was a product line in use by various
>government agencies for secure (fault-tolerant) computing for a long
>time. I'd look there for starters.
(I thought this was too speculative, but given Tim's guess..)
I have also t
Mary tried to ignore the sobbing of her sister in the next room. It
had been two days since They came to her village and she was still in
shock. Two days is the minimum time to wait, Alex had said, before
Talking. Alex was the fellow from the Engineers Sans Frontiers who
had given her the Kit.
John Young wrote:
> We've been unable to retrieve more than a few words from
> the redacted portions (by use of xerography to reveal text
> below the overwrites), and would appreciate any leads on
> what NONSTOP means. Joel McNamara has been searching
> for NONSTOP info for some time:
>
I ha
This is going to be a GREAT year for you! Take 5 min.
Please read all of this!
EARN $100,000 PER YEAR SENDING E-MAIL!!!
***
You can earn $50,000 or more in the next 90 days sending e-mail, seem
impossible? Read on for det
This is going to be a GREAT year for you! Take 5 min.
Please read all of this!
EARN $100,000 PER YEAR SENDING E-MAIL!!!
***
You can earn $50,000 or more in the next 90 days sending e-mail, seem
impossible? Read on for det
ATTENTION BUSINESS OWNER/OPERATOR 15
>From time to time, most companies experience a cash flow problem. These problems
>can range from temporary cash crunches with the inability to pay trade creditors and
>suppliers within the granted credit terms to more serious problems including
>bankrup
I guess if your critical server is simply some sort of service provider
and the only data requiring security are the operating keys then your
hostile location is OK since rebuilding a system and restoring a few
keys ( which can be hidden just about anywhere ) is easily done.
Otherwise the loss of
At 05:09 AM 1/12/01 -0500, [EMAIL PROTECTED] wrote:
>So here's another solution. The hard drive itself is encrypted, and
>the encryption/decryption hardware is part of the hard drive chips,
>and all are mounted within a tamper-resistant enclosure. Also mounted
>in this enclosure is a little batt
At 08:52 PM 1/11/01 -0500, [EMAIL PROTECTED] wrote:
>i saw ur name somewhere on a board,... u were talking about NORTON YOUR
EYES
>ONLY,.. i was wondering if u knew where i could get the US version or
if u
>could send,... thanx,...
Soliciting to steal software? We've contacted the BSA and AOL.
Here's something I would like to see: a harddrive that is
tamper-resistant. The threat model is a server is deployed in an
untrusted machineroom, and recovery of plaintext from the system is
unacceptable. One obvious attack, involving an encrypted hard drive,
is for the attackers to have a "pow
19 matches
Mail list logo