Re: fyi: Storm Worm botnet numbers, via Microsoft

2007-10-22 Thread Brandon Enright
On Mon, 15 Oct 2007 16:02:54 -0700 plus or minus some time ' =JeffH '
[EMAIL PROTECTED] wrote:
 
 I haven't come across any detailed Storm extent analysis, even with
 having Google search specific security company sites (e.g. using 
 site:sec-corp.com). So if anyone has pointers to pages (other than the
 MSFT blog article pointed to in an earlier post) that present a sane and 
 substantiated analysis of Storm extent, please post 'em. Maybe folks
 don't want to (post 'em or point to 'em)? Are there papers in
 submission? ;-)
 
   

Detailed analysis of the Storm network, how it works, its size, etc is
being activly worked on by several research groups.  Storm is nowhere near
50 million nodes and never was.

I will be presenting /some/ of this work at Toorcon in San Diego this
Saturday:

http://www.toorcon.org/2007/event.php?id=38

The presentation is not academic paper quality and takes more of a
code-monkey approach to the network.  Real (sane and substantiated)
numbers, stats, and graphs will be presented.  To the best of my knowledge,
it will be the first publicly released estimates of the size of the network
with actual supporting data and evidence.

Brandon

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Quantum Crytography to be used for Swiss elections

2007-10-22 Thread Jon Callas


On Oct 22, 2007, at 12:07 PM, Steven M. Bellovin wrote:


On Thu, 18 Oct 2007 12:49:40 -0700
Jon Callas [EMAIL PROTECTED] wrote:




Ah, there are some trustworthy photons.  Oops, we can trust them,
but we don't know if they are relevant.  Ah, there's a relevant
photon


And we know they are trustworthy photons because they have
certificates signed by an accredited third-party boson.


Boson or bogon?


Boson. Bosons are force-carrier particles, as opposed to fermions.  
Photons are themselves bosons, but there are other bosons that carry  
other forces. There's the Higgs boson, W and Z bosons, and so on.  
Gluons, the particles that hold atomic nuclei together are also bosons.


Bogons are, technically, bosons as they are the particle that carries  
a quantum unit of bogosity. However, you yourself have criticized  
people who discuss the role of bogosity in quantum cryptography [sic]  
(I prefer the term quantum secrecy), and therefore I will say no  
more about bogons and QC.


Jon

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Intelligent Redaction

2007-10-22 Thread Leichter, Jerry
| Xerox Unveils Technology That Blocks Access to Sensitive Data in
| Documents to Prevent Security Leaks
| http://www.parc.com/about/pressroom/news/2007-10-15-redaction.html
| 
| The Innovation: The technology includes a detection software tool that
| uses content analysis and an intelligent user interface to easily
| protect sensitive information. It can encrypt only the sensitive
| sections or paragraphs of a document, a capability previously not
| available.
Actually, it looks as if Xerox has been doing a bunch of very
interesting work on the borderlines of security, privacy,
cryptography, and human factors.  I hadn't noticed it before.

Look, for example, at:

http://www.parc.com/research/projects/security/default.html

(Now, can anyone account for the bizarre very light gray pattern
of lines that appear behind the top half or so of this page?)


-- Jerry

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Intelligent Redaction

2007-10-22 Thread David Koontz

--- Ali, Saqib [EMAIL PROTECTED] wrote:

 Xerox Unveils Technology That Blocks Access to Sensitive Data in
 Documents to Prevent Security Leaks
 http://www.parc.com/about/pressroom/news/2007-10-15-redaction.html
 
 The Innovation: The technology includes a detection software tool
 that
 uses content analysis and an intelligent user interface to easily
 protect sensitive information. It can encrypt only the sensitive
 sections or paragraphs of a document, a capability previously not
 available.
 
 saqib
 http://security-basics.blogspot.com/
 
Philosophy on the new technology:

http://ars.userfriendly.org/cartoons/?id=20071019mode=classic

http://ars.userfriendly.org/cartoons/?id=20071020mode=classic

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]