I just saw this news story yesterday, and I wasn't sure if folks
around here already knew about it or not, but since the subject
of silly export restrictions had come up on this list recently,
I thought that I should share...
http://www.theregister.co.uk/2014/10/17/intel_subsidiary_crypto_export
In message <5441783e.1070...@sixdemonbag.org>,
"Robert J. Hansen" wrote:
>It's pretty easy to show, for instance, that breaking a 256-bit cipher
>with a Zarbnulaxian quantum computer would release so much heat the
>earth would be uninhabitable.
Well, I'm damn glad I asked then.
I *had* invite
In message <5440e5b8.4090...@digitalbrains.com>,
Peter Lebbing wrote:
>On 17/10/14 01:44, Ronald F. Guilmette wrote:
>> In your reply, you said, in effect, "Using X is too complicated" and
>> you suggested no other alternatives.
>
>This is simply not true
In message <54409469.9090...@sixdemonbag.org>,
"Robert J. Hansen" wrote:
>> I just want to keep out those with ernest, but
>> not too intensely motivated curiosity.
>
>Crypto comes in only two varieties: the kinds that will keep secrets
>safe against a motivated thirteen-year-old, and the kinds
In message ,
Kristian fiskerstrand wrote:
>>>...
>>> - From where do I take the key?
>>
>> The key will be embedded in the compiled binary of the program I'm building.
>
>This would be easily extracted and only offer limited protection
As stated in my other replies: Yes, I know.
P.S. Wherea
In message <5440196b.8070...@sixdemonbag.org>,
"Robert J. Hansen" wrote:
>> I have a program. It's written in C. I intend to distribute it, in
>> binary form only, to other sites. I do not and will not control how
>> any fo the local disks are configured at those other sites.
>
>The question
In message <54401557.1030...@sixdemonbag.org>,
"Robert J. Hansen" wrote:
>> I have a program that will frequently need to store modest-size
>> chunks of of data on disk, perhaps 1-4kB per chunk. The data is
>> sensitive, but not ultra top secret. I would like to make a
>> reasonable effort to
In message <544005e3.2040...@digitalbrains.com>,
Peter Lebbing wrote:
>On 15/10/14 23:45, Ronald F. Guilmette wrote:
>> There *are* simply solutions to this rather trivial and common
>> problem.
>
>I don't consider that a trivial problem, actually. I can think
I'm sorry that I could not reply right away. I was called to other
duties.
In message <8738aomjb1@vigenere.g10code.de>,
Werner Koch wrote:
>On Wed, 15 Oct 2014 23:45, r...@tristatelogic.com said:
>
>> detailed, 134 page (PDF) manual for the library, and yet prospective
>> users of the lib
In message <543e3c8e.3030...@digitalbrains.com>,
Peter Lebbing wrote:
>On 13/10/14 21:14, Ronald F. Guilmette wrote:
>> Mostly I just need
>> something that will be simple for me to implement in my program,
>> even though I am by no means knowledgable about cryptogra
Greetings,
I have a program that will frequently need to store modest-size
chunks of of data on disk, perhaps 1-4kB per chunk. The data is
sensitive, but not ultra top secret. I would like to make a
reasonable effort to keep it from prying eyes. After being stored,
the data will later on need
11 matches
Mail list logo