Re: Code name Killer Rabbit: New Sub Can Tap Undersea Cables
On Feb 18, 2005, at 19:47, R.A. Hettinga wrote: It does continue to be something of a puzzle as to how they get this stuff back to home base, said John Pike, a military expert at GlobalSecurity.org. I should think that in many cases, they can simply lease a fiber in the same cable. What could be simpler?
Re: Do We Need a National ID Card?
On Dec 22, 2004, at 8:53, R.A. Hettinga wrote: Do we need a national ID card? The comment period on NIST's draft FIPS-201 (written in very hasty response to Homeland Security Presidential Directive HSPD-12) ends tomorrow. The draft, as written, enables use of the card by Smart IEDs and for improved selection of kidnapping victims. One cabinet department's Associate CIO for Cybersecurity said of this project, Eventually this is going to lead to a national ID card. Refs: http://csrc.nist.gov/piv-project/ http://www.fas.org/irp/offdocs/nspd/hspd-12.html http://csrc.nist.gov/publications/drafts/draft-FIPS_201-110804- public1.pdf
Re: Maths holy grail could bring disaster for internet
On Sep 6, 2004, at 21:52, R. A. Hettinga wrote: But the proof should give us more understanding of how the primes work, and therefore the proof might be translated into something that might produce this prime spectrometer. If it does, it will bring the whole of e-commerce to its knees, overnight. So there are very big implications. This would be a good thing. Because to rebuild the infrastructure based on symmetric crypto would bring the trusted third party (currently the CA) out of the shadows and into the light.
Re: Challenge to TCPA/Palladium detractors
I'd like the Palladium/TCPA critics to offer an alternative proposal for achieving the following technical goal: Allow computers separated on the internet to cooperate and share data and computations such that no one can get access to the data outside the limitations and rules imposed by the applications. [...] You could even have each participant compile the program himself, but still each app can recognize the others on the network and cooperate with them. Unless the application author can predict the exact output of the compilers, he can't issue a signature on the object code. The compilers then have to be inside the trusted base, checking a signature on the source code and reflecting it somehow through a signature they create for the object code.