Re: Using crypto against Phishing, Spoofing and Spamming...

2004-07-25 Thread Peter Gutmann
Enzo Michelangeli [EMAIL PROTECTED] writes: Can someone explain me how the phishermen escape identification and prosecution? Gaining online access to someone's account allows, at most, to execute wire transfers to other bank accounts: Some (a lot of?) large-scale phishing is done by or with the

Re: dual-use digital signature [EMAIL PROTECTED]

2004-07-25 Thread Peter Gutmann
Sean W. Smith [EMAIL PROTECTED] writes: I would have thought that de facto standard approach is: the client constructs the certificate request message, which contains things like the public key and identifying info, and signs it. The CA then checks the signature against the public key in the

Energy Dept. Shelves Removable Disks

2004-07-25 Thread R. A. Hettinga
http://www.washingtonpost.com/ac2/wp-dyn/A10205-2004Jul23?language=printer The Washington Post washingtonpost.com Energy Dept. Shelves Removable Disks Response to Security Breach at Lab Associated Press Saturday, July 24, 2004; Page A02 The Energy Department, in response to a security