Re: Code name Killer Rabbit: New Sub Can Tap Undersea Cables

2005-02-22 Thread Matt Crawford
On Feb 18, 2005, at 19:47, R.A. Hettinga wrote:
It does continue to be something of a puzzle as to how they get this 
stuff
back to home base, said John Pike, a military expert at 
GlobalSecurity.org.
I should think that in many cases, they can simply lease a fiber in the 
same cable.  What could be simpler?



Re: Do We Need a National ID Card?

2004-12-22 Thread Matt Crawford
On Dec 22, 2004, at 8:53, R.A. Hettinga wrote:
Do we need a national ID card?
The comment period on NIST's draft FIPS-201 (written in very hasty  
response to Homeland Security Presidential Directive HSPD-12) ends  
tomorrow.  The draft, as written, enables use of the card by Smart  
IEDs and for improved selection of kidnapping victims.

One cabinet department's Associate CIO for Cybersecurity said of this  
project, Eventually this is going to lead to a national ID card.

Refs:
http://csrc.nist.gov/piv-project/
http://www.fas.org/irp/offdocs/nspd/hspd-12.html
http://csrc.nist.gov/publications/drafts/draft-FIPS_201-110804- 
public1.pdf



Re: Maths holy grail could bring disaster for internet

2004-09-07 Thread Matt Crawford
On Sep 6, 2004, at 21:52, R. A. Hettinga wrote:
But the proof should give us more understanding of how the
primes work, and therefore the proof might be translated into something
that might produce this prime spectrometer. If it does, it will bring 
the
whole of e-commerce to its knees, overnight. So there are very big
implications.
This would be a good thing.  Because to rebuild the infrastructure 
based on symmetric crypto would bring the trusted third party 
(currently the CA) out of the shadows and into the light.



Re: Challenge to TCPA/Palladium detractors

2002-08-08 Thread Matt Crawford

 I'd like the Palladium/TCPA critics to offer an alternative proposal
 for achieving the following technical goal:
   Allow computers separated on the internet to cooperate and share data
   and computations such that no one can get access to the data outside
   the limitations and rules imposed by the applications.
 [...]
 You could even have each participant compile the program himself,
 but still each app can recognize the others on the network and
 cooperate with them.

Unless the application author can predict the exact output of the
compilers, he can't issue a signature on the object code.  The
compilers then have to be inside the trusted base, checking a
signature on the source code and reflecting it somehow through a
signature they create for the object code.