Michael Paul Johnson wrote:
Of course this is dangerous, but there is a demand for it. Not everyone
wants bomb-proof security. ... The real cure, of course, is to so
tightly and easily integrate security into email that it is as easy
as this to use, but not as risky.
Steven M. Bellovin
There's bomb-proof security, and there's "security" that itself is a time
bomb. I fear that self-extracting decryptors are much closer to
the latter than to the former -- very much closer.
At this stage, it's hard to see much justification for self-extracting crypto
any more. There are
In article v04020adeb33016fecdf7@[139.167.130.249],
Robert Hettinga [EMAIL PROTECTED] wrote:
Do any of the ipsec folks out there have any idea whether the Palm III has
the oomph to do IPSEC?
The secret word is "proxy".
I'm thinking about that active badge stuff, where you beam yourself an
At 01:14 PM 4/6/1999 -0700, Jim Gillogly wrote:
Michael Paul Johnson wrote:
Of course this is dangerous, but there is a demand for it. Not everyone
wants bomb-proof security. ... The real cure, of course, is to so
tightly and easily integrate security into email that it is as easy
as this to
Perhaps, for the applications Bob is thinking about, your port of the SSH
client could suffice.
Enzo
-Original Message-
From: Ian Goldberg [EMAIL PROTECTED]
Newsgroups: isaac.lists.cryptography
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
Date: Wednesday, April 07, 1999 6:01 AM
Subject: Re: