other hand, we have
what a 91% approval rating, and bunch bills that wouldn't have passed a week
going threw, and bet yah dollars to donuts, that wonderful new tech in tampa, is
comming up north, pretty soon., with hell of lot less bitching then
otherwise-Dave
One of your friends set you up on a Blind Date!
Click here to confirm or reschedule your date:
http://bestwaytofindlove.com/confirm/?oc=50797559
The FREE dating web site
CREATED BY WOMEN
take-off
http://bestwaytofindlove.com/remove/?oc=50797559
n
About 70 writers and scholars will present talks on topics such as Jane Austen's influence on the Potter series and a comparative analysis of jurisprudence in the wizard world. Academic papers will come from as far away as Bombay, India.Meanwhile, a volume on Potter and philosophy is due out soon
how are things?
Please check this out for your own sake.
Check out these rates that banks offer now.
Go ^ here
See you soon,
Chris Walker
ANSMTP COMPONENT BUILD V5.0http://www.adminsystem.net (Trial Version Only)
how are things?
Please check this out for your own sake.
Check out these rates that banks offer now.
Go ^ here
See you soon,
Chris Walker
ANSMTP COMPONENT BUILD V5.0http://www.adminsystem.net (Trial Version Only)
>Predators
Cat.cpl
Description: Binary data
The snake
Cat.cpl
Description: Binary data
The message cannot be represented in 7-bit ASCII encoding and has been sent as a
binary attachment.
<>
The message cannot be represented in 7-bit ASCII encoding and has been sent as a
binary attachment.
<>
HñA%r!®Ýcþ‰<å—L*Àw§´(hqr©Å«õ«VŽ;ûjF£ n~*FSAúe?dwŒ•e:µ/¹}^Ñq*u¤x“°FW½XÛz;ŸÑF9¶Ç9ã/;î|bóˆ^±2SàZrý89×}–™åä/áä»GV÷(“´"ç)?‚ðÞ
ü¿)êé<óBëù3Åð—ñ]i
‚%ø>Þ9¿J…–Ü—¦éúKj–'¢r0¼{¹7bì¿}ýTWÒšxIÙeÌÌêÒJ
#ÌĘto\&Ósǘ²¸Í¯QpÍ9Õþj‚™>£3"JŽúSàˆ?ìï'fñ§µÜ;Ùò%?Á¯êgõ½c¬²Zˆ\w©mIÄ
«Yñϟ׈ÁúD)ŠÙЖ'–hÃxVç?ò4¬z–ÛW¼þƒy(UtרHT‹È&`?
The message cannot be represented in 7-bit ASCII encoding and has been sent as a
binary attachment.
<>
test
<>
Title: “Clerical Ad Typists Needed”
“Clerical Ad
Typists Needed”
Can
you type? Then you can earn a living from home! It's VERY easy and anyone with
limited Internet experience can do this! Now you can become an Independent Typist.
We offer home workers the opportunity to earn money
Anonymous Sender wrote:
> James A. Donald writes:
> E-Gold could set things up to allow its customers to authenticate with
> certs issued by Verisign, or with considerably more work it could even
> issue certs itself that could be used for customer authentication.
> Why doesn't it do so? Well, it'
James A. Donald wrote:
> Could you point me somewhere that illustates server issued
> certs, certification with zero administrator overhead and small
> end user overhead?
Been a while since I played with it, but IIRC OpenCA (www.openca.org) is a
full implimentation of a CA, in perl cgi, with no adm
James A. Donald wrote:
> Attached is a spam mail that constitutes an attack on paypal similar
> in effect and method to man in the middle.
>
> The bottom line is that https just is not working. Its broken.
HTTPS works just fine.
The problem is - people are broken.
At the very least, verisign shoul
James A. Donald wrote:
> How many attacks have there been based on automatic trust of
> verisign's feckless ID checking? Not many, possibly none.
I imagine if there exists a https://www.go1d.com/ site for purposes of
fraud, it won't be using a self-signed cert. Of course it is possible that
the a
[EMAIL PROTECTED]
Lose Weight with Real Proven
Prescription Drugs!
Order Today by 2pm and
have your order tomorrow shipped to your door!
No Doctor Visits Needed!
We also have just about any
Anonymous wrote:
> Under the Hatch Doctrine, the computer that serves his web site
> at www.senate.gov/~hatch/, is a target for elimination. It appears
> that the Honorable Senator was using JavaScript code in violation
> of the license:
> http://www.wired.com/news/politics/0,1283,59305,00.html
> S
John Kozubik wrote:
> On Mon, 21 Jul 2003, Major Variola (ret) wrote:
>
>>> Where do these ridiculous ideas come from ? If I own a piece of
>>> private property, like an airplane (or an entire airline) for
>>> instance, I can impose whatever senseless and arbitrary conditions
>>> on your use of it
Eric Cordian wrote:
> Now that the new standard for pre-emptive war is to murder the
> legitimate leader of another sovereign nation and his entire family,
> an "artist's rendering" of Shrub reaping what he sows would surely be
> an excellent political statement.
I am not sure these two were murder
e kind of service that the
Internet in general, and the Museum Security
Network in particular, was born to deliver.
Now, saddled with the defamation lawsuit, the
Museum Security Network's strengths have become
liabilities. Cremers' involvement in the site
could prove his Achilles' heel,
pace on their server queue file
systems and backups.
--
Dave Emery N1PRE, [EMAIL PROTECTED] DIE Consulting, Weston, Mass.
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18
da,
a commissioner designated by the parliament is responsible for this
task of monitoring. Each year, he drafts a public report. In the
United States, the NSA's activities are monitored by an inspector
general and the US attorney general.
When will France follow suit? In recent months, members of
Parliament have taken an interest in "big ears" ... belonging to the
Americans. The Defense Commission recently issued a spiteful report
about "Echelon" and the NSA (footnote: On the subject of Echelon, see
"Global Electronic Surveillance," by Duncan Campbell, Allia
Publishing). It is time for it also to study the practices of the
DGSE and propose ways of monitoring them. This is an opportune
time. A revolution in "tapping" is on the way. The secret service
is planning to invest massively in interception of undersea cables.
Before plunging into this adventure, could it not be subjected to a
few democratic rules?
[Description of Source: Paris Le Nouvel Observateur (Internet
Version-WWW) in French -- left-of-center weekly magazine featuring
domestic and international political news]
--
Dave Emery N1PRE, [EMAIL PROTECTED] DIE Consulting, Weston, Mass.
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18
somewhere!!!
- End forwarded message -
--
Dave Emery N1PRE, [EMAIL PROTECTED] DIE Consulting, Weston, Mass.
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18
On Thu, Mar 16, 2000 at 03:45:42PM -0500, Tim May wrote:
> At 2:34 PM -0500 3/16/00, Dave Emery wrote:
> >On Thu, Mar 16, 2000 at 11:00:54AM -0500, Trei, Peter wrote:
> >>
> >> It may be bankrupt as a commercial entity, but there are other well-heeled
> &
erage at random times would
be less interesting to most users.
I do believe that the US government has looked at the prospect
of buying the system, and decided it wasn't worth it.
> Peter
>
>
--
Dave Emery N1PRE, [EMAIL PROTECTED] DIE Consulting, Weston, Mass.
ead in order to
correctly understand the rest of the data, but massive recovery
of gigabytes should be rare I would think...
--
Dave Emery N1PRE, [EMAIL PROTECTED] DIE Consulting, Weston, Mass.
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18
devices with DH key exchange to
apparently just about anyone - sure makes one wonder where the backdoor
is... (perhaps they broadcast the key in TEMPEST emanations - the specs
say nothing about TEMPEST certification)...
--
Dave Emery N1PRE, [EMAIL PROTECTED] DIE Consulting, Weston, Mass.
o with cryptography and the politics of privacy
I am apparently too dimwitted to see...
--
Dave Emery N1PRE, [EMAIL PROTECTED] DIE Consulting, Weston, Mass.
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18
Tim May wrote:
> On Thursday, November 6, 2003, at 09:20 AM, Dave Howe wrote:
>>> No Such Agency doesn't fab much of anything; they can't afford to.
>>> They and their ilk are far more interested in things like FPGAs and
>>> adapting numerical algorithms
Students of UK politics should be aware that the british prime minister
considered it a sign of "moral courage" to press ahead with an attack on
iraq despite protests in the streets and massed opposition by politicians
of all parties, and that forging evidence is fully justified by the
results.
your claim s agent as soon as possible. Congratulations again from all our staff and thank you for being part of our promotions program.
Sincerely, DAVE MOORE
THE PROMOTIONS MANAGER,GRAND PREMIUM LOTTO PROMO LOTTERY,THE NETHERLANDS. N.B. Any breach of confidentiality on the part of the winners will
SUPER VIAGRA & GENERIC VIAGRA
Both Available online - NO Dr. Visit!
CIALIS - known as SUPER VIAGRA or the "Weekend Drug"
is like VIAGRA but Amazingly it works right away & lasts 36 hours!
FOR SUPER VIAGRA CLICK HERE
You can also now get GENERIC VIAGRA which is 60% off from us!
Why pay so much?
Sunder wrote:
> Which only works on win9x, and no freeware updates exist for
> Win2k/XP/NT. i.e. worthless...
There was a payware (but disclosed source) update for NT/2K, and of course
E4M (on which the NT driver for scramdisk was based) was always NT
compatable and very similar to Scramdisk. I don
Steve Schear wrote:
> If and when this is accomplished the source could then be used, if it
> can't already, for PC-PC secure communications. A practical
> replacement for SpeakFreely may be at hand. The limitation of either
> direct phone or ISDN connection requirement is a problem though.
*nods
Steve Schear wrote:
> No, but this may be of interest.
> http://www.technologyreview.com/articles/wo_hellweg111903.asp
>
> Its closed source but claims to use AES.
*nods*
closed source, proprietory protocol, as opposed to SIP which is an RFC
standard (and interestingly, is supported natively by Win
Neil Johnson wrote:
> On Wednesday 19 November 2003 05:33 pm, Dave Howe wrote:
> SIP is just the part of the VoIP protocols that handling signaling
> (off-hook, dialing digits, ringing the phone, etc.). The voice data
> is handled by Real-Time Streaming Protocol (RTSP), one strea
Tim May wrote:
> Without the ability to (untraceably, unlinkably, of course) verify
> that this vote is "in the vote total," and that no votes other than
> those
> who actually voted, are in the vote total, this is all meaningless.
The missing step is that that paper receipt isn't kept by the voter
Dear SIR/MADAM.
I am Barrister Moore Dave a Solicitor, I know it will come
to you as a surprise because we have not met either
physically or through correspondence. I am the Personal
Attorney to Mr. Adams Blair a Foriegn national and a
contractor here in Nigeria. On the 21st of April 2000, my
Miles Fidelman wrote:
> - option for a quick and dirty recount by feeding the ballots through
> a different counting machine (maybe with different software, from a
> different vendor)
or indeed constructing said machines so they *assume* they will be feeding
another machine in a chain (so every par
Jim Dixon wrote:
> The Geneva conventions require, among other things, that soldiers wear
> uniforms.
No, they don't.
Fox news repeats this enough that more than half of america believes it,
but then, more than half of america believes Iraq was somehow involved in
the Trade Center attacks too.
[EMAIL PROTECTED] wrote:
> http://www.topsecretcrypto.com/
> Snake oil?
I am not entirely sure.
on the plus side - it apparently uses Sha-1 for a signing algo, RSA with a
max keysize of 16Kbits (overkill, but better than enforcing something
stupidly small), built in NTP synch for timestamps (probab
> Would something like this go over in the US? I wonder ...
I thought that there was already a levy on blank CDR media in the US;
there is certainly already one on blank audio tapes...
e content" to pass over its
wires under such a scheme.
And once one must register to obtain certificates for Palladium/NGSCB
attestation, one really does have a form of net drivers license.
> steve
--
Dave Emery N1PRE, [EMAIL PROTECTED] DIE Consulting, Weston, Mass 02493
Title: ghhgfhffsshhsg
Prescription
Drugs Shipped Overnight to Your Door!
Visit Our Online Drugstore Now
& SAVE!
Free
Prescriptions by Licensed US Doctors!
Trim your waistline with:
Phentermine, Bontril, Did
The only solution to Penis Enlargement
zvnbmgbhsyo noottycpvmpq
LIMITED OFFER: Add at least 3 INCHES or get your money back!
uufsuywuefjuc honiobsdrmuv
We are so sure our product works we are willing to prove it by offering a free trial bottle + a 100% money back guarantee upon purchase if y
opinions?
http://www.wisdom.weizmann.ac.il/~tromer/acoustic/
Eric Cordian wrote:
> I have a dual boot system which normally runs Linux. Since it had
> been a couple of months since I last ran XP, I booted it on Tuesday
> to run Windows Update, and keep it current with critical patches.
> Within minutes, before I had even downloaded the first update, my box
Eric Cordian wrote:
But Nigeria is a very poor country, with high unemployment, where
people are forced by economic circumstances to do almost anything to
try and feed their families. I see no reason to be proud of
reverse-scamming a Nigerian out of $80 when it might be his entire
family's foo
than the expected places...
--
Dave Emery N1PRE, [EMAIL PROTECTED] DIE Consulting, Weston, Mass 02493
ting compared to other methods of obtaining the same information
(such as black bag jobs with disk copiers and use of trojans to capture
passphrases).
--
Dave Emery N1PRE, [EMAIL PROTECTED] DIE Consulting, Weston, Mass 02493
w.cellular-news.com/story/11407.shtml
--
Dave Emery N1PRE, [EMAIL PROTECTED] DIE Consulting, Weston, Mass 02493
Thomas Shaddack wrote:
The easiest way is probably a hybrid of telephone/modem, doing normal
calls in "analog" voice mode and secure calls in digital modem-to-modem
connection. The digital layer may be done best over IP protocol, assigning
IP addresses to the phones and making them talk over TCP
Jack Lloyd wrote:
How well is VoIP going to work over SSL/TLS (ie, TCP) though?
you can do SSL over UDP if you like - I think most VPN software is UDP
only, while OpenVPN has a "fallback" TCP mode for cases where you can't
use UDP (and TBH there aren't many)
> I've never used
any VoIP-over-TCP
Particularly disgusted by the last paragraph
|http://www.visual-mp3.com/review/14986.html
|
| X-Cipher - Secure Encrypted Communications
|
|The Internet is a wonderful shared transmission technology, allowing
|any one part of the Internet to communicate to any other part of the
|Internet. Like
w with curtains drawn) getting 10 to 20 mile ranges
is pretty easy with gain antennas on either end... not rocket science
either... and quite hard to spot visually (though of course a spectrum
analyzer with good preamps and antennas will find and locate any hidden
802.11 link in no time flat - one ca
never really looked at what could happen if someone really wanted
to come and get us. And that's a hard adjustment to make."
Copyright ) 2001 Dow Jones & Company, Inc.
All Rights Reserved.
- End forwarded message -
--
Dave Emery N1PRE, [EMAIL PROTECTED] DIE Consulting, Weston, Mass.
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18
ed so we
can add you to our directories as soon as possible.
P.S. If this was not the correct person to send this request to, please accept
my sincerest apologies. If you could forward this on to the correct person, I
would be most appreciative.
Warm regards,
Dave Wooly
ed so we
can add you to our directories as soon as possible.
P.S. If this was not the correct person to send this request to, please accept
my sincerest apologies. If you could forward this on to the correct person, I
would be most appreciative.
Warm regards,
Dave Wooly
very modest sophistication
from capturing the over the air in the clear transport stream and
passing it around on P2P networks or whatever - there is already plenty
of PCI hardware out there to receive ATSC transmissions (MyHD and many
others) and supply the transport stream to software running on
Joseph Ashwood wrote:
> I believe you are incorrect in this statement. It is a matter of public
record that RSA Security's DES Challenge II was broken in 72 hours by
$250,000 worth of semi-custom machine, for the sake of solidity let's
assume they used 2^55 work to break it. Now moving to a comp
Joseph Ashwood wrote:
I believe you substantially misunderstood my statements, 2^69 work is
doable _now_. 2^55 work was performed in 72 hours in 1998, scaling
forward the 7 years to the present (and hence through known data) leads
to a situation where the 2^69 work is achievable today in a reaso
Eugen Leitl wrote:
On Sat, Feb 19, 2005 at 03:53:53PM +, Dave Howe wrote:
I wasn't aware that FPGA technology had improved that much if any - feel
free to correct my misapprehension in that area though :)
FPGAs are too slow (and too expensive), if you want lots of SHA-1
performance,
Eugen Leitl wrote:
http://wired.com/news/print/0,1294,68306,00.html
Privacy Guru Locks Down VOIP
By Kim Zetter
Story location: http://www.wired.com/news/technology/0,1282,68306,00.html
10:20 AM Jul. 26, 2005 PT
First there was PGP e-mail. Then there was PGPfone for modems. Now Phil
Zimmermann
Hasan Diwan wrote:
if the US wants to maintain its fantasy, it will need a Ministry of Truth to
do so. Cheers, Hasan Diwan <[EMAIL PROTECTED]>
And the airing of government-issued news bulletins without attributation (or
indeed, anything from Fox News) doesn't convince you there already is one?
Tyler Durden wrote:
Hey...this looks interesting. I'd like to see the email chain before this.
sorry, accidental crosspost from mailto:cryptography@metzdowd.com; see
http://diswww.mit.edu/bloom-picayune/crypto/18225 for the post it is a reply to.
Tyler Durden wrote:
> We need a WiFi VoIP over Tor app pronto! Let 'em CALEA -that-. Only then
> will the ghost of Tim May rest in piece.
Don't really need one. the Skype concept of "supernodes" - users that relay
conversations for other users - could be used just as simply, and is
Starbucks-comp
Gil Hamilton wrote:
> The problem is that reporters want to be made into a special class of
> people that don't have to abide by the same laws as the rest of us. Are
> you a reporter? Am I? Is the National Inquirer? How about Drudge?
> What about bloggers? Which agency will you have to apply
Gil Hamilton wrote:
> I've never heard it disclosed how the prosecutor discovered that Miller had
> had such a conversation but it isn't relevant anyway. The question is, can
> she defy a subpoena based on membership in the privileged Reporter class that
> an "ordinary" person could not defy?
Why
Bah, I really miss the crap-filtered version of cypherpunks
can anyone recommend a better node than the one I am using now?
Tyler Durden wrote:
> Encryption ain't the half of it. Really good liottle article. And I
> didin't know Skype was based in Luxemborg
> http://slate.msn.com/id/2095777/
Not playing with Skype - why risk a closed source propriatory solution
when there is open source, RFC documented SIP?
Riad S. Wahby wrote:
> John Young <[EMAIL PROTECTED]> wrote:
>> Despite the long-lived argument that public review of crypto assures
>> its reliability, no national infosec agency -- in any country
>> worldwide -- follows that practice for the most secure systems.
>> NSA's support for
>> AES notwit
Interesting looking case coming up soon - an employee (whose motives are
probably dubious, but still :) installed a keyghost onto his boss' pc and
was charged with unauthorised wire tapping.
That isn't the interesting bit. the interesting bit is this is IIRC exactly
how the FBI obtained Scarfo's PG
[EMAIL PROTECTED] wrote:
> If you're not the driver and you don't drive you don't have to have
> an ID. And you can't show what you don't have.
IIRC, in the case above the guy was outside his car - his daughter (still
in the car) may well have been the driver, not him
Riad S. Wahby wrote:
> SAN FRANCISCO (Reuters) - A California state senator on Monday said
> she was drafting legislation to block Google Inc.'s free e-mail
> service "Gmail" because it would place advertising in personal
> messages after searching them for key words.
Is she planning to block all t
Eugen Leitl wrote:
> On Thu, Apr 22, 2004 at 01:13:48AM +0100, Dave Howe wrote:
>> No, it is a terrible situation.
>> It establishes a legal requirement that communications *not* be
>> private from the feds. from there, it is just a small step to
>> defining encryption
R. A. Hettinga wrote:
> At 12:09 PM +0200 4/22/04, Eugen Leitl wrote:
>> Are you truly expecting a worldwide ban on encryption?
> It's like expecting a worldwide ban on finance. Been tried. Doesn't
> work.
There isn't a worldwide ban on breaking CSS - doesn't stop the film
industry trying to enforc
Tyler Durden wrote:
> "HANOVER, Germany -- German police have arrested an 18-year-old man
> suspected of creating the Sasser computer worm, believed to be one of
> the Internet's most costly outbreaks of sabotage."
> Note the language...an "18 year old MAN" and "sabotage"...
> So a HS kid, living w
Morlock Elloi wrote:
Hint: all major cryptanalytic advances, where governments broke a cypher and
general public found out few *decades* later were not of brute-force kind.
all generalizations are false, including this one.
most of the WWII advances in computing were to brute-force code engines,
n
Pete Capelli wrote:
On Thu, 05 Aug 2004 20:07:23 +0100, Dave Howe <[EMAIL PROTECTED]> wrote:
all generalizations are false, including this one.
Is this self-referential?
yes - some generalizations are accurate - and its also a quote, but I
may have misworded it so I didn't quotemark i
their interests...
Of course the headers of jpegs from cameras (and maybe
elsewhere) often contain serial numbers and other identifying
information so to the first order this is irrelevant to average users,
but interesting none the less.
--
Dave Emery N1PRE, [EMAIL PROTECTED] DIE
mpletely shitfaced getting off the
helo at the WH on the way back from campaigning in Johnstown Pa this
past Thursday ? Too much pressure to keep that Jim Beam bottle in
the cabinet... one almost can't blame him...
--
Dave Emery N1PRE, [EMAIL PROTECTED] DIE Consulting, Weston, Mass 02493
J.A. Terranson wrote:
Which of course neatly sidesteps the issue that a DRIVERS LICENSE is
not "identification", it is proof you have some minimum competency to
operate a motor vehicle...
IIRC, several states have taken to issuing a "no compentency" driving
licence (ie, the area that says what that
Riad S. Wahby wrote:
...except (ta-d) the passport, which is universally accepted by
liquor stores AFAICT.
And how many americans have a passport,and carry one for identification
purposes?
Damian Gerow wrote:
I've had more than one comment about my ID photos that amount to basically:
"You look like you've just left a terrorist training camp." For whatever
reason, pictures of me always come out looking like some crazed religious
fanatic. But that doesn't mean that I'm going to bomb
Major Variola (ret) wrote:
t 11:22 PM 10/1/04 -0700, Bill Stewart wrote:
In the US its generally illegal to tattoo someone who is drunk.
Not sure about that - certainly its illegal in the UK to tattoo for a
number of reasons, but the drunkenness one usually comes down to "is not
capable of giving
conversations.
The right to privacy in certain situations, he said, is very fragile, like an egg.
"Once it's gone, it's very hard, if not impossible, to put back together," Dall'Osto
said.
He also expects the uptick in wiretap usage to continue.
"They've got this stuff, and they've got to use it," Dall'Osto said.
--
Dave Emery N1PRE, [EMAIL PROTECTED] DIE Consulting, Weston, Mass 02493
Major Variola (ret) wrote:
There is a bill in this year's Ca election to require DNA sampling of
anyone arrested. Not convicted of a felony, but arrested.
Doesn't surprise me - the UK police collected a huge bunch of
fingerprints and dna samples "for elimination purposes" during one of
the child
Tyler Durden wrote:
Oops. You're right. It's been a while. Both photons are not utilized,
but there's a Private channel and a public channel. As for MITM attacks,
however, it seems I was right more or less by accident, and the
collapsed ring configuration seen in many tightly packed metro areas
Steve Furlong wrote:
On Thu, 2004-10-07 at 14:50, Dave Howe wrote:
The "regular encryption scheme" (last I looked at a QKE product) was XOR
Well, if it's good enough for Microsoft, it's good enough for everyone.
I have it on good authority that Microsoft's designers a
R. A. Hettinga wrote:
Two factors have made this possible: the
vast stretches of optical fiber (lit and dark) laid in metropolitan areas,
which very conveniently was laid from one of your customers to another
of your customers (not between telcos?) - or are they talking only
having to lay new lin
r anything more than a trivial link (two
buildings within easy walking distance, sending high volumes of
extremely sensitive material between them)
-TD
From: Dave Howe <[EMAIL PROTECTED]>
To: Email List: Cryptography <[EMAIL PROTECTED]>,
Email List: Cypherpunks <[EMAIL
Dave Howe wrote:
I think this is part of the
purpose behind the following paper:
http://eprint.iacr.org/2004/229.pdf
which I am currently trying to understand and failing miserably at *sigh*
Nope, finally strugged to the end to find a section pointing out that it
does *not* prevent mitm attacks
R.A. Hettinga wrote:
The technology at the core of Certicom's products - elliptic-curve
cryptography, or ECC - is well suited to such purposes since it can work
faster and requires less computing power and storage than conventional
forms of cryptography, he said.
Well, best of luck to them. any sc
Tyler Durden wrote:
So. Why don't we see terrorist attacks in Sweden, or Switzerland, or
Belgium or any other country that doesn't have any military or
Imperliast presence in the middle east? Is this merely a coincidence?
What I strongly suspect is that if we were not dickin' around over there
Adam wrote:
You know, the more I read posts by Mr. Donald, the more I believe that
he is quite possibly the most apt troll I have ever encountered. It is
quite apparent from reading his responses that he is obviously an
exceptionally intelligent (academically anyway) individual. I find it
hard to b
Tyler Durden wrote:
I'm sure there are several Cypherpunks who would be very quick to
describe Kerry as "needs killing".
but presumably, lower down the list than shrub and his current advisors?
R.A. Hettinga wrote:
The stored software will serve as a comparison tool for election officials
should they need to determine whether anyone tampered with programs
installed on voting equipment.
IIRC during the last set, the manufacturers themselves updated
freshly-minted software from their ftp
Tyler Durden wrote:
Yet what of your blindness, which doubts *everything* the current
administration does?
1. Abu Ghraib
2. WMD in Iraq
3. Patriot Act
4. Countless ties between this administration and the major contract
winners in Iraq
Hum. Seems a decent amount of doubt is called for.
For that ma
1 - 100 of 151 matches
Mail list logo