Re: Cars hacked through wireless tire sensors

2010-08-11 Thread dan
| | Unlike the work earlier this year, these attacks are more of a | nuisance than any real danger; the tire sensors only send a message | every 60-90 seconds, giving attackers little opportunity to compromise | systems or cause any real damage. Nonetheless, both pieces of research

Fwd: Re: new tech report on easy-to-use IPsec

2010-08-11 Thread Adam Aviv
I think the list may get a kick out of this. The tech-report was actually posted on the list previously, which is where I found it. Link included for completeness. http://mice.cs.columbia.edu/getTechreport.php?techreportID=1433 Original Message Subject: Re: new tech report

Re: A mighty fortress is our PKI, Part II

2010-08-11 Thread Thor Lancelot Simon
On Wed, Aug 04, 2010 at 10:46:44PM -0700, Jon Callas wrote: I think you'll have to agree that unlike history, which starts out as tragedy and replays itself as farce, PKI has always been farce over the centuries. It might actually end up as tragedy, but so far so good. I'm sure that if we

Re: A mighty fortress is our PKI, Part II

2010-08-11 Thread Peter Gutmann
Thor Lancelot Simon t...@rek.tjls.com writes: If you want to see a PKI tragedy in the making, have a look at the CRLs used by the US DoD. Only in the making? Actually it's all relative, in Japan the Docomo folks turned off CRLs because they found that even a relatively modest CRL (not just the

Re: Is this the first ever practically-deployed use of a threshold scheme?

2010-08-11 Thread mhey...@gmail.com
On Sun, Aug 1, 2010 at 7:10 AM, Peter Gutmann pgut...@cs.auckland.ac.nz wrote: ...does anyone know of any significant use [of split keys] by J.Random luser?  I'm interested in this from a usability point of view. Maybe not J.Random but J.Corporate... A few jobs ago back in the late '90s, I