OK, I'll admit that the math in this type of paper is completely beyond me.
http://www.wired.com/wiredscience/2014/02/cryptography-breakthrough/ But, hasn't he, or any of his friends, paid any attention to malware in the past two decades? There is plenty of obfuscation out there. (Most of it does what his program does: turn little programs into bloated monsters.) Admittedly, this is an academic analysis of the foundations of what you can do, and probably will, eventually, with a lot of development, provide for a number of applications. But I'm going to want to see a lot more explanation (by someone who understands what he has been told) before I'm going to get excited about this. ====================== (quote inserted randomly by Pegasus Mailer) [email protected] [email protected] [email protected] Congress ... shall make no law abridging the freedom of sXXXch, the right of the people peaceably to XXXemble, and to peXXXion the government for a redress of grievances. - from the First Amendment to the US ConsXXXution victoria.tc.ca/techrev/rms.htm http://www.infosecbc.org/links http://blogs.securiteam.com/index.php/archives/author/p1/ http://twitter.com/rslade _______________________________________________ Fun and Misc security discussion for OT posts. https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Note: funsec is a public and open mailing list.
