> Ed Gerck wrote:
> > As to the counter-example you ask, the general public profits by
> > lack of disclosure of the algorithm that allows nuclear bombs
> > to be made with 1 pound of enriched uranium. We have less
> > nuclear powers.
>
I'd like one of the real physicists on the list to weigh i
>What I object to is the _forced_ "kindness" based on mob rule, where
>it is decreed that we must all donate money at the point of a gun to
>support welfare bums who got high instead of reading and studying.
Welfare may have started with the best of intentions, but the result is
multiple genera
Reese wrote:
>>What about if I purchase the Navaho module for my Dragon
>>Dictate, voice input software, and have it translate the conversations I
>>capture from by back porch?
>>
>IANAL. This may fall under illegal eavesdropping, whether you make a
>recording MayOrMayNot be a determining factor
Reese wrote:
>Under the Buchanan admin, they probably will?
>
>And just wtf makes you think Buchanan has a candles chance in a tornado?
>
>The problem isn't what an un-electable candidate wants to do,
a) Unless Gore or Bush declares themselves Dictator-For-Life, there will be
elections again in 2
At 11:23 AM 3/24/00 +0200, Marcel Popescu wrote:
>From: David Honig <[EMAIL PROTECTED]>
>> Each bit in the output has a 50-50 chance of flipping. If
>> you flip an input bit. Look up avalanche.
>
>Er.. do you mean that if I encrypt a 64-bit counter equal to zero, and then
>I increment it (and re-
At 09:33 AM 3/24/00 -0500, Fisher Mark wrote:
>[Just a reminder: These are my opinions, and whether they match TCE's
>opinions is truly coincidental.
Don't worry, you're not granted personhood here, you're
recognized only as a forgable nym.
Since you haven't linked anything irrefutable and pers
o suspend a fledgling home-rule government
over lack of progress
on disarmament by Irish Republican Army guerrillas.
http://dailynews.yahoo.com/h/nm/2324/tc/britain_spies_1.html
X-Loop: openpgp.net
From: David Honig <[EMAIL PROTECTED]>
> >Er.. do you mean that if I encrypt a 64-bit counter equal to zero, and
then
> >I increment it (and re-encrypt), I should get two very different values?
>
> Think about it. If you *didn't*, then there would be a
> useful distance metric
Success Story: $census2000++
(March 20) The United States Constitution requires a complete enumeration of
its citizens every ten years. How does the Census Bureau handling this? They
use Perl, of course. Lisa Nyman ( mailto:[EMAIL PROTECTED] ) offers this
tidbit:
The Bureau has been using perl f
--
Whenever you do something legally, they just pass more laws. There is
no point. Just do it illegally.
--digsig
James A. Donald
6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
T1TO6NF9MeRXAaSwhmxLQYttE79g1wweal5w4X4w
4O9y+1LWTPT/oKUG99WGUJpxE2MfVe79y5wvggzs8
At 11:26 AM 3/24/00 -0500, Marcel Popescu wrote:
>From: David Honig <[EMAIL PROTECTED]>
>
>> >Er.. do you mean that if I encrypt a 64-bit counter equal to zero, and
>then
>> >I increment it (and re-encrypt), I should get two very different values?
>>
>> Think about it. If you *didn't*, then there
> This bit was reprinted from the Pagosa Springs Sun... This is but one
of
>many situations people are facing out west with regards to even there
OWN
>private property that may be surrounded by "public land" or abutt it.
With
>the Wildlands Project being pushed the way that it is this could star
On Fri, Mar 24, 2000 at 11:32:54AM -0500, Marcel Popescu wrote:
> (March 20) The United States Constitution requires a complete enumeration of
> its citizens every ten years. How does the Census Bureau handling this? They
> use Perl, of course. Lisa Nyman ( mailto:[EMAIL PROTECTED] ) offers this
Subject: stop huffing, reese
At 05:45 AM 3/24/00 -0500, Reese wrote:
>>and under the Buchanan Administration they probably will,
>>during the War On Something.
>
>Under the Buchanan admin, they probably will?
>
>And just wtf makes you think Buchanan has a candles chance in a tornado?
>
>
>Jesus B
X-Loop: openpgp.net
From: David Honig <[EMAIL PROTECTED]>
> A hash needn't have this property. A hash is just a mapping with a
smaller
> output space than input. A cryptographically-strong hash does have this
> property.
That's what I wanted to say. :)
> >I'm using someone else's implementati
At 05:17 PM 3/24/00 -0500, Marcel Popescu wrote:
>Ok, I am using a different implementation now. Using Blowfish, with the key
>"key", a 64-bit counter equal to 0x0, in CFB mode, with a nil initialization
>vector,
CFB doesn't matter, as you've used 0 as your IV...
>gives me the result: 7DF2193
Dear anonymous:
Fuck off.
ps - I don't huff, and there's still no evidence to suggest there ever will
be a Buchanon Administration. He still has less chance than a candle in a
tornado.
At 12:40 PM 24/03/00 -0500, [EMAIL PROTECTED] wrote:
>Subject: stop huffing, reese
>
>At 05:45 AM 3/24/00 -0
http://dow-chipseal.se-com.com/
excerpt
Dow Corning Corporation has developed a tamper
resistant composite using silicon-based thin film materials
for the U.S. Government. These materials inhibit and deter
access of sensitive information contained within t
>entering 'AFDC' as their occupation (Aid to Families with Dependent
>Children, i.e. welfare), kids being dragged through crackhouses from birth
"Aid to Families of Dependent Classes".
--
A quote from Petro's Archives: **
If the courts star
Does anybody know of a public document explaining the cipher modes (CBC,
CFB, and so on) to laymen? I would like to know the pros and cons.
More specifically, what mode should I use for 3DES in Yarrow? [The Yarrow
paper doesn't specify it.]
Thanks,
Mark
-
All inventions or works of authorsh
20 matches
Mail list logo