Re: And now, a java encoder ring!

1999-08-01 Thread Peter Gutmann
Andreas Bogk [EMAIL PROTECTED] writes: Udhay Shankar N [EMAIL PROTECTED] writes: For me, the highlight of the JavaOne Developer Conference in San Francisco last March was Dallas Semiconductor's iButton with Java -- aka the Java Ring, a wearable computer that ran Java. It allegedly had a

[RRE]Anonymous Communication on the Internet

1999-08-01 Thread Robert Hettinga
--- begin forwarded text Date: Sat, 31 Jul 1999 13:39:52 -0700 (PDT) From: Phil Agre [EMAIL PROTECTED] To: "Red Rock Eater News Service" [EMAIL PROTECTED] Subject: [RRE]Anonymous Communication on the Internet Sender: [EMAIL PROTECTED] List-Subscribe: mailto:[EMAIL PROTECTED] [Reformatted to

Re: House committee ditches SAFE for law enforcement version

1999-08-01 Thread Bill Frantz
At 12:26 PM -0700 7/26/99, Rick Smith wrote: At 10:48 AM 7/26/99 -0700, Tom Perrine wrote: I'll take that I worked on systems to handle highly-classified data in full multi-level environements (A1 candidates). Been there, done that. Got the scars. At least we got Uncle Sam to pay the

Re: US Urges Ban of Internet Crypto

1999-08-01 Thread Udhay Shankar N
At 02:05 PM 7/29/99 -0400, Robert Hettinga wrote: The more money people make with internet commerce, the fewer legs totalitarians will have to stand on when they call for the criminalization of strong cryptography. I wish I could agree with you. I think, however, that your thesis holds only

Summary re: /dev/random

1999-08-01 Thread Sandy Harris
This is an attempt to summarize a wide-ranging discussion and see if we have a consensus. There's been much discussion on at least three lists: [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] of design of random number generators in general and Linux /dev/random in

IP: Protecting Computers, and Privacy

1999-08-01 Thread Robert Hettinga
Imagine that. The New York Times opposed to government invasions of privacy... Whadda country... :-/. Cheers, RAH --- begin forwarded text From: [EMAIL PROTECTED] Date: Sun, 01 Aug 1999 13:12:01 -0500 To: [EMAIL PROTECTED] Subject: IP: Protecting Computers, and Privacy Cc: [EMAIL PROTECTED]

IP: Text of Letter from Rep. Bob Barr to Sandy Berger

1999-08-01 Thread Robert Hettinga
--- begin forwarded text Date: Sun, 1 Aug 1999 12:10:51 -0400 (EDT) From: Washington Weekly [EMAIL PROTECTED] Subject: IP: Text of Letter from Rep. Bob Barr to Sandy Berger To: [EMAIL PROTECTED] Sender: [EMAIL PROTECTED] Reply-To: Washington Weekly [EMAIL PROTECTED] TEXT OF LETTER FROM

Re: Summary re: /dev/random

1999-08-01 Thread Anonymous
Sandy Harris writes: Conclusions I've reached that I hope there's agreement on: More analysis is needed, especially in the area of how to estimate input entropy. (Yarrow does this quite differently than /dev/random. I'm not convinced either is right, but I've nothing else to propose.

Proposal (was Summary re: /dev/random)

1999-08-01 Thread Sandy Harris
In an ealier message I wrote: Conclusions I've reached that I hope there's agreement on: More analysis is needed, especially in the area of how to estimate input entropy. [SNIP] Yarrow's two-stage design, where the output from hashing the pool seeds a pseudo-random number generator