[I'm only permitting this because of the general interest. I will
accept NO OTHER MELISSA RELATED MESSAGES, PERIOD. --Perry]
http://www.techweb.com/wire/story/TWB19990402S0008
Suspected Creator Of Melissa Virus Arrested (04/02/99, 12:21 p.m. ET) By
Christine Casatelli,
A New Jersey man has bee
> I guess it all depends on what "entities" means:
point of information: in any policy document, the game
is at least half over by the end of the "definitions"
page. read them carefully before you invest...
--dan
>Before cheering too much about McCain's apparent change >of heart, it's
>worth doing some arithmetic.
I guess it all depends on what "entities" means:
Permit the exportation of non-defense encryption (above 64 bits) to
responsible entities and governments of North Atlantic Treaty Organizati
Before cheering too much about McCain's apparent change of heart, it's
worth doing some arithmetic. 64-bit ciphers are vulnerable to a brute
force attack that costs 256 times what an attack on the same 56-bit
cipher would cost. Plug in EFF's 250K and you see that a similar design
would cost $64M
Dave Anderson wrote to note both that McCain's original press release
is at:
http://www.senate.gov/~mccain/encrypt.htm
Perry
Senator John McCain ends support of key escrow, joins Senators Burns,
Leahy and Wyden in sponsoring liberalization legislation. This could
be a major reversal for the anti-crypto forces -- Senator McCain was a
big obstacle to crypto export deregulation in the past.
NY Times URL:
http://www.nyt
On 1 Apr 99 at 20:34, Greg Broiles wrote:
> A popular misconception about trademark rights is the assumption
> that they're created by the filing of a trademark application.
> That's not correct. Trademarks are created and maintained when
> someone (who can be a person or other form of legal per
In article <[EMAIL PROTECTED]>,
Michael Curry <[EMAIL PROTECTED]> wrote:
>Neal included an interesting piece about his view of operating
>systems).
Which is quite a nice piece. Also on the page is an excerpt from the book.
Ooohhh... I want more... :-)
I'll even ignore the technical errors (as
Jeff Simmons writes:
> There's also a page at http://www.well.com/user/neal/cypherFAQ.html
> that is aimed at the cypherpunk list. Most interesting part is that
> evidently Bruce Schneier designed a special cypher for use in the novel,
> based on a deck of playing cards. (?)
I'll ask the obv
The novel is quite fun. It's full of cypherpunks, both modern and
WW2-era. The main characters are doing confusion operations to
cover up for Enigma-reading gaffes, and setting up a fully
encrypted data haven in an island nation. You'll recognize several
characters, though you might not be sure
Apropos the discussions about the appropriateness of RSADSI and their
attempt to gain trademark status for the acronym "RSA" applied to a
particular public key system -
A popular misconception about trademark rights is the assumption that
they're created by the filing of a trademark application.
11 matches
Mail list logo