Andreas Bogk [EMAIL PROTECTED] writes:
Udhay Shankar N [EMAIL PROTECTED] writes:
For me, the highlight of the JavaOne Developer Conference in San
Francisco last March was Dallas Semiconductor's iButton with Java -- aka
the Java Ring, a wearable computer that ran Java. It allegedly had a
--- begin forwarded text
Date: Sat, 31 Jul 1999 13:39:52 -0700 (PDT)
From: Phil Agre [EMAIL PROTECTED]
To: "Red Rock Eater News Service" [EMAIL PROTECTED]
Subject: [RRE]Anonymous Communication on the Internet
Sender: [EMAIL PROTECTED]
List-Subscribe: mailto:[EMAIL PROTECTED]
[Reformatted to
At 12:26 PM -0700 7/26/99, Rick Smith wrote:
At 10:48 AM 7/26/99 -0700, Tom Perrine wrote:
I'll take that I worked on systems to handle highly-classified
data in full multi-level environements (A1 candidates).
Been there, done that. Got the scars. At least we got Uncle Sam to pay the
At 02:05 PM 7/29/99 -0400, Robert Hettinga wrote:
The more money people make with internet commerce, the fewer legs
totalitarians will have to stand on when they call for the
criminalization of strong cryptography.
I wish I could agree with you. I think, however, that your thesis holds
only
This is an attempt to summarize a wide-ranging discussion
and see if we have a consensus.
There's been much discussion on at least three lists:
[EMAIL PROTECTED]
[EMAIL PROTECTED]
[EMAIL PROTECTED]
of design of random number generators in general and
Linux /dev/random in
Imagine that. The New York Times opposed to government invasions of privacy...
Whadda country...
:-/.
Cheers,
RAH
--- begin forwarded text
From: [EMAIL PROTECTED]
Date: Sun, 01 Aug 1999 13:12:01 -0500
To: [EMAIL PROTECTED]
Subject: IP: Protecting Computers, and Privacy
Cc: [EMAIL PROTECTED]
--- begin forwarded text
Date: Sun, 1 Aug 1999 12:10:51 -0400 (EDT)
From: Washington Weekly [EMAIL PROTECTED]
Subject: IP: Text of Letter from Rep. Bob Barr to Sandy Berger
To: [EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]
Reply-To: Washington Weekly [EMAIL PROTECTED]
TEXT OF LETTER FROM
Sandy Harris writes:
Conclusions I've reached that I hope there's agreement on:
More analysis is needed, especially in the area of how
to estimate input entropy.
(Yarrow does this quite differently than /dev/random.
I'm not convinced either is right, but I've nothing
else to propose.
In an ealier message I wrote:
Conclusions I've reached that I hope there's agreement on:
More analysis is needed, especially in the area of how
to estimate input entropy.
[SNIP]
Yarrow's two-stage design, where the output from
hashing the pool seeds a pseudo-random number
generator