NSA abandons some cool stuff

2001-01-06 Thread Peter Wayner
The Baltimore Sun has a long article on an abandoned NSA listening spot in the hills of North Carolina. Some radio astronomers wrangled control of it so it won't go to waste. http://www.sunspot.net/content/cover/story?section=cover&pagename=story&storyid=1150520223288 --

Re: Schneier: Why Digital Signatures are notSignatures (was Re: CRYPTO-GRAM, November 15, 2000)

2000-11-17 Thread Peter Wayner
> Schneier's piece does a good job of listing some of the problems with digital signatures, but he really throws the baby out with the bathwater when he concludes that "Digital signatures aren't signatures." This has been his habit lately. The book _Secrets and Lies_ is filled with plenty of

On-line voting schemes?

2000-11-09 Thread Peter Wayner
Can anyone point me toward any of the on-line voting schemes that people have explored? Presumably people have discussed how to do this with certificates. I'm sort of interested. -Peter -- -- Tune to http://www.wayner.org/books/ffa/ for information on my book on Free

Re: DMCA Final Rule

2000-10-31 Thread Peter Wayner
> > >More to the point, if you buy a Japanese DVD containing literary works, >such as movies or artwork or music or (given this definition) games, >and it fails to work because the access control mechanism >doesn't know how, that seems like a slam-dunk application >for this exemption to the DMCA f

Re: DMCA Final Rule

2000-10-29 Thread Peter Wayner
> >2. Literary Works, Including Computer Programs and >Databases, Protected by Access Control Mechanisms >That Fail to Permit Access Because of Malfunction, >Damage or Obsoleteness." If you ask me, Linux, FreeBSD, OpenBSD, and NetBSD are the wave of the future. If my forward-looking computer ca

US stole Codebreaking Limelight from Britain in WWII?

2000-09-06 Thread Peter Wayner
According to the Daily Telegraph, the US took most of the credit for breaking Japanese codes during WWII. The paper says that Bletchley Park deserves more credit according to recently declassified papers. Only traditional British reticence kept them from claiming credit before. http://www.te

Re: Comcast@Home bans VPNs

2000-08-21 Thread Peter Wayner
Is making an SSL connection creating a VPN? It's really not much different in an abstract sense. Most applications are using browsers as interfaces anyway. So I think this will only encourage businesses to set up SSL server/client models instead of general VPNs. -Peter -- ---

Re: FBI involves itself in Verio merger

2000-07-07 Thread Peter Wayner
Looks like the FBI is between a rock and a hard place. If they keep pushing Calea, they force the engineers to make it super easy for people to spy on the US. Why bother to send folks skulking around in the middle of the night when you can just buy a backbone provider? You might even make so

Java, Crypto and Speed

2000-06-22 Thread Peter Wayner
Has anyone experimented with writing crypto code in Java using the BigInteger class? It's a nice package with plenty of neat functions, but I haven't played with it yet. Is it fast enough? I'm really curious about the speed. -Peter

Java, Crypto and Speed

2000-06-22 Thread Peter Wayner
Has anyone experimented with writing crypto code in Java using the BigInteger class? It's a nice package with plenty of neat functions, but I haven't played with it yet. Is it fast enough? I'm really curious about the speed. -Peter -- -- Tune to http://www.wayner.org/

NSA Layoffs?

2000-06-07 Thread Peter Wayner
The NSA is announcing that it is "laying off" about 2000 people. They will be replaced by outside contractors. Here's the story in the Baltimore Sun: http://www.sunspot.net/content/news/story?section=news-maryland-sun&pagename=story&storyid=1150340224903

Pass phrases, Hushmail and Ziplip

2000-05-12 Thread Peter Wayner
I think all crypto products rely on passphrases. Every wallet is locked with a passphrase. Every private key is locked away. Even the smart cards are usually sewn up with PINs. It's just a fact of life and it seems unfair to me to pick upon Hushmail. -Peter

Irish scheme for RSA via matrices and the past

1999-02-02 Thread Peter Wayner
When the news first broke about Sarah Flannery's work on morphing RSA into matrices defined over finite fields, I mentioned that I had seen a similar paper earlier. Brian Winkel, the editor of Cryptologia, did some digging for me and found the piece in the April 85 issue. It was by Vijay Varadhar

Re: What happened to this NY Times article on STOA andEchelon?

1998-12-10 Thread Peter Wayner
The search software at the NYT leaves much to be desired. If you enter from the front page, it assumes you only want to search TODAY's copy of the paper. You have to re-search and click on the whole archives. Of course, that often yields too many articles to wade through. For speed, here's the