Re: [FoRK] X.509 certificate collision via MD5 collisions (fwd from jeff@k2.com)

2005-03-02 Thread "Hal Finney"
Eugen forwards from FoRK: > >Colliding X.509 Certificates version 1.0 > >1st March 2005 > >Arjen Lenstra, Xiaoyun Wang, and Benne de Weger > > > >http://eprint.iacr.org/2005/067 > > > >We announce a method for the construction of pairs of valid X.509 > >certificates in which the ?to be signed? part

Re: I'll show you mine if you show me, er, mine

2005-02-24 Thread "Hal Finney"
to have provable security! This way of doing things would also be quite inefficient; there are two ElGamal encryptions going back and forth (typically 2048 bits each) for every bit of your password. I'll bet the actual paper has a much more clever scheme which improves the efficiency and has a nice proof of security. I'm looking forward to seeing it. Hal Finney

Cypherpunk help with Hal Finney demo

2005-02-14 Thread "Hal Finney"
need a minimum of 4 or 5 people doing it, but as I said a dozen or more would be great. Sorry about the last minute notice; I know that most people won't see this until too late, but if anyone sees it now and you know how to use BT I'd appreciate your help. Thanks! Hal Finney

Re: Off-the-Record Messaging (IM plugin)

2004-12-16 Thread "Hal Finney"
> Nikita Borisov and Ian Goldberg have released > Off-the-Record Messaging (http://www.xelerance.com/mirror/otr/), It looks like Ian Goldberg's site might be a more authoritative source, http://www.cypherpunks.ca/otr/ . One interesting feature is authentication + deniability. You know who you ar

Re: Your source code, for sale

2004-11-08 Thread "Hal Finney"
Ben Laurie writes: > How do you make the payment already "gone" without using a third party? Of course there has to be a third party in the form of the currency issuer. If it is someone like e-gold, they could do as I suggested and add a feature where the buyer could transfer funds irrevocably in

RE: Your source code, for sale

2004-11-05 Thread "Hal Finney"
Michael_Heyman writes: > Finney, Hal (CR): > > The problem is that if the source code you are purchasing is > > bogus, or if the other side doesn't come through, you're > > screwed because you've lost the value of the torn cash. The > > other side doesn't gain anything by this fraud, but they h

Re: Your source code, for sale

2004-11-05 Thread "Hal Finney"
Enzo Michelangeli writes: > In the world of international trade, where mutual distrust between buyer > and seller is often the rule and there is no central authority to enforce > the law, this is traditionally achieved by interposing not less than three > trusted third parties: the shipping line, t

RE: Your source code, for sale

2004-11-04 Thread "Hal Finney"
"Tyler Durden" writes: > So my newbie-style question is, is there an eGold that can be verified, but > not accessed, until a 'release' code is sent? > > In other words, say I'm buying some hacker-ed code and pay in egold. I don't > want them to be able to 'cash' the gold until I have the code. Me

Re: Federal program to monitor everyone on the road

2004-10-01 Thread "Hal Finney"
There was a brief mention of this technology at the Crypto conference. I provided some pointers in a comment to an Ed Felten blog entry at http://www.freedom-to-tinker.com/archives/000677.html#comments (scroll down to the 3rd comment). Dan Boneh et al presented a proposal for a group signature sch

Re: potential new IETF WG on anonymous IPSec

2004-09-09 Thread "Hal Finney"
tions between communicators who don't share any secrets or CAs. I don't think "anonymous" is the right word for this, and I hope the IETF comes up with a better one as they go forward. Hal Finney

Seth Schoen's Hard to Verify Signatures

2004-09-08 Thread "Hal Finney"
eap would it be possible to try verifying the signature under different keys and see which one worked. Hal Finney

Re: Remailers an unsolveable paradox?

2004-09-01 Thread "Hal Finney"
Spam is the least of the problems for remailers when it comes to abuse. You should be more concerned about possible liability for illegal messages. In a way, spam has actually made the remailer operator's life easier as people today are used to receiving annoying and obscene email. Ten years ago,

RPOW - Reusable Proofs of Work

2004-08-15 Thread "Hal Finney"
e server code, which will invalidate any RPOW tokens which people have previously created. So don't go too crazy hoarding up RPOWs quite yet. Thanks very much - Hal Finney

Re: On what the NSA does with its tech

2004-08-04 Thread "Hal Finney"
MV writes: > Yes. They can't break a 128 bit key. That's obvious. ("if all the > atoms in the > universe were computers..." goes the argument). Not necessarily, if nanotechnology works. 128 bits is big but not that big. Eric Drexler, in Nanosystems, section 12.9, predicts that a nanotech base

Re: Email tapping by ISPs, forwarder addresses, and crypto proxies

2004-07-07 Thread "Hal Finney"
r. The difference I suppose is that the forwarder would be selling privacy services, hence different ones would compete to get a good reputation. Any cheating might be detected by insider whistle blowers or perhaps some kind of audit. Hal Finney