Re: SF Bay Area Cypherpunks March 2001 Physical Meeting Announcement
That's Declan for you, on one hand holds to be a proponent of individual freedom and on the other trying to impose his twisted view of the worl on others. On Thu, 8 Mar 2001, Rodney Thayer wrote: .xxx domains and a W-Washington update -- Declan McCullagh Declan will hold forth on his recent work opposing the creation of a .xxx top-level domain. Also, he'll give an update on what 'W' Before a larger group can see the virtue of an idea, a smaller group must first understand it. "Stranger Suns" George Zebrowski The Armadillo Group ,::;::-. James Choate Austin, Tx /:'/ ``::/|/ [EMAIL PROTECTED] www.ssz.com.', `/( e\ 512-451-7087 -~~mm-'`-```-mm --'-
Re: Fwd: from Edupage, December 22, 2000
On 3 Jan 2001, Jaap-Henk Hoepman wrote: Except that eavesdropping on the quantum key distribution channel is _always_ detected (by `laws of nature'), which is not true for these pressure-monitored cables. It's not true here anymore either. Last year there was at least one group that demonstrated a mechanism for taking a doublet and making it a quartet without effecting the entanglement. Check the cypherpunks archive for the particular post, early this year. I was the one who posted it to the list. Before a larger group can see the virtue of an idea, a smaller group must first understand it. "Stranger Suns" George Zebrowski The Armadillo Group ,::;::-. James Choate Austin, Tx /:'/ ``::/|/ [EMAIL PROTECTED] www.ssz.com.', `/( e\ 512-451-7087 -~~mm-'`-```-mm --'-
RE: Java, Crypto and Speed
On Sat, 1 Jul 2000, Simon Aronson wrote: Yes, I have, It is pretty fast. Diffie Hellman Applets can be found at http://www.rdg.ac.uk/~sip99sma (The CGI is REALLY slow though - am working on that, perl is not good for BigIntegers) Then use Java if it's faster. There is certainly nothing about CGI that requires Perl. I've even done some using UCBLogo. Life is a tale told by an idiot, full of sound and fury, signifying nothing. W. Shakespeare The Armadillo Group ,::;::-. James Choate Austin, Tx /:'/ ``::/|/ [EMAIL PROTECTED] www.ssz.com.', `/( e\ 512-451-7087 -~~mm-'`-```-mm --'-
Re: NSA back doors in encryption products
On Wed, 24 May 2000, Eugene Leitl wrote: Rick Smith writes: If NSA/MS are not doing it, they must be pretty stupid, because I'd do it in their place. The prudent assumption is hence: your online system can't be completely trusted, whether OpenSource, or not. Encryption should be done in hardware. Bull, the hardware companies aren't any more trustworthy. The future is downloading. Can you hear the impact? O[rphan] D[rift] Cyber Positive The Armadillo Group ,::;::-. James Choate Austin, Tx /:'/ ``::/|/ [EMAIL PROTECTED] www.ssz.com.', `/( e\ 512-451-7087 -~~mm-'`-```-mm --'-
Re: Unrestricted crypto software web posting
On Thu, 20 Jan 2000, Matt Blaze wrote: Consider it done; the alias: [EMAIL PROTECTED] now appends to http://www.crypto.com/exports/mail.txt, and also mails to [EMAIL PROTECTED] (currently empty, but that will change as people use it). Do you agree to surrender any rights explicit or implied with respect to use of submissions to this site? Do you agree to not alter or remove any submissions (without the authors consent would be acceptable)? The future is downloading. Can you hear the impact? O[rphan] D[rift] Cyber Positive The Armadillo Group ,::;::-. James Choate Austin, Tx /:'/ ``::/|/ [EMAIL PROTECTED] www.ssz.com.', `/( e\ 512-451-7087 -~~mm-'`-```-mm --'-
Killer PKI Applications (fwd)
- Forwarded message from Peter Cassidy - Date: Mon, 10 Jan 2000 18:08:00 -0500 (EST) From: Peter Cassidy [EMAIL PROTECTED] Subject: Killer PKI Applications I am engaged in an expansive and challenging authoring assignment regarding PKI's rationale in the large e-commerce plexus. I'm casting about for ideas on the killer PKI application. I'd like to hear any ideas - however wild or domesticated - in this space. I can repay all kindnesses with beer and whatever appreciations that providence provides I can bestow in the future. - End of forwarded message from Peter Cassidy - Take Plan 9's current DES based network protocol and beef it up all the way around. Include inherent public key management as a standard function in all three server types. The future is downloading. Can you hear the impact? O[rphan] D[rift] Cyber Positive The Armadillo Group ,::;::-. James Choate Austin, Tx /:'/ ``::/|/ [EMAIL PROTECTED] www.ssz.com.', `/( e\ 512-451-7087 -~~mm-'`-```-mm --'-
starting up servers that need access to secrets (fwd)
- Forwarded message from Jeffrey M. Smith - Date: Tue, 04 Jan 2000 16:40:40 -0500 From: "Jeffrey M. Smith" [EMAIL PROTECTED] Subject: starting up servers that need access to secrets Is there a good solution to the problem of starting up a network server that needs access to an encrypted database? For instance, a server that has its own RSA key pair encrypted on disk, and needs to decrypt it during operation so the private key is available in memory? [ text deleted] - End of forwarded message from Jeffrey M. Smith - If you find any let me know, I have the same problem myself. To date the only solution I've come up with would be some sort of PCMCIA card key generator and another algorithm on the drives boot loader that would calculate a new key based on the old key and some parameter like the time of day (the PCMCIA would have to have an independent and accurate clock itself). If the PCMCIA card is ever removed from the server it could be auto erased or perhaps simply increment the key with some alternate method that would then require a manualy typed in pass phrase (in both cases). The future is downloading. Can you hear the impact? O[rphan] D[rift] Cyber Positive The Armadillo Group ,::;::-. James Choate Austin, Tx /:'/ ``::/|/ [EMAIL PROTECTED] www.ssz.com.', `/( e\ 512-451-7087 -~~mm-'`-```-mm --'-
Re: BXA (fwd)
- Forwarded message from Greg Broiles - Date: Tue, 19 Oct 1999 15:13:53 -0700 From: Greg Broiles [EMAIL PROTECTED] Subject: Re: BXA It appears that this may no longer be correct. John Young has made available on his website a document http://cryptome.org/bernstein-mot.htm filed by the US Government with respect to the en banc rehearing of the Ninth Circuit's decision in the _Bernstein_ case. In short, the US Government is asking the court to postpone oral argument in the case until the US Government has revealed the new regulations, promised for release on December 15 1999. - End of forwarded message from Greg Broiles - Which shouldn't be relevant since his rights were impacted under the *old* law. Even if the new regulations do permit unlimited export of crypto then he'd still have a reason to push the case. The best lack all conviction, while the worst are full of passionate intensity. W.B. Yeats The Armadillo Group ,::;::-. James Choate Austin, Tx /:'/ ``::/|/ [EMAIL PROTECTED] www.ssz.com.', `/( e\ 512-451-7087 -~~mm-'`-```-mm --'-