hether an individual nexus has the right to invoke a
specific security operation. In addition, SSC functions that reveal
potentially machine-identifying information, such as the RSA public key,
can only be performed once per SSC reset (and the SSC cannot be reset
from software; you have to power-cycle the PC).
--
Adam Lydick <[EMAIL PROTECTED]>
er
hashing (for obvious reasons). I think this just raises the bar a tiny
bit though, as an attacker could stalk their victim before stealing
their card to get an idea about what appearance to forge. (or capture
webcam traffic before lifting the card / identity info)
Cheers,
Adam Lydick
On Tue,
algorithm),
and real randomness? (I suppose this could make the channel detectable)
Thanks,
Adam Lydick
unsubscribe cypherpunks
uot;words" to an improved soundex-like hash would be a
more effective technique for dealing with this issue. Anyone know of any
work in this area? (spell-checker research would probably yield the most
results)
Adam Lydick
On Mon, 2003-09-22 at 15:39, Thomas Shaddack wrote:
> Could be the l