Re: [Cryptography] Email and IM are ideal candidates for mix networks
On Tue, Aug 27, 2013 at 2:04 PM, Wendy M. Grossman < wen...@pelicancrossing.net> wrote: > It's clear you're not a journalist or working in any other profession > where you actually need to be able to communicate spontaneously with > strangers. > And if the people who attacked the NY Times' DNS today had chosen to replace the NY Times' MX records with pointers to their own mailserver . . . communications intended for journalists would be in the hands of the Syrian Electronic Army, or whoever's actually responsible for the hack. Unencrypted E-mail is going to result in someone's death pretty quickly, if it hasn't already. -- Greg Broiles gbroi...@gmail.com (Lists only. Not for confidential communications.) ___ The cryptography mailing list cryptography@metzdowd.com http://www.metzdowd.com/mailman/listinfo/cryptography
Re: Hushmail in U.S. v. Tyler Stumbo
weak passphrase which was susceptible to a dictionary attack. I would be surprised to learn that Hush Communication actively engages in dictionary attacks versus its users at the request of the Canadian government. If that is the case, this would seem to go beyond an obligation to merely turn over existing information, and become active participation in an attempt to subvert the security of communication between Hushmail users. -- Greg Broiles, JD, LLM Tax, EA [EMAIL PROTECTED] (Lists only. Not for confidential communications.) Legacy Planning Law Group San Jose, CA California Estate Planning Blog: http://www.estateplanblog.com - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]