The Baltimore Sun has a long article on an abandoned NSA listening
spot in the hills of North Carolina. Some radio astronomers wrangled
control of it so it won't go to waste.
http://www.sunspot.net/content/cover/story?section=cover&pagename=story&storyid=1150520223288
--
>
Schneier's piece does a good job of listing some of the problems with
digital signatures, but he really throws the baby out with the
bathwater when he concludes that "Digital signatures aren't
signatures." This has been his habit lately. The book _Secrets and
Lies_ is filled with plenty of
Can anyone point me toward any of the on-line voting schemes that
people have explored? Presumably people have discussed how to do this
with certificates. I'm sort of interested.
-Peter
--
--
Tune to http://www.wayner.org/books/ffa/ for information on my book
on Free
>
>
>More to the point, if you buy a Japanese DVD containing literary works,
>such as movies or artwork or music or (given this definition) games,
>and it fails to work because the access control mechanism
>doesn't know how, that seems like a slam-dunk application
>for this exemption to the DMCA f
>
>2. Literary Works, Including Computer Programs and
>Databases, Protected by Access Control Mechanisms
>That Fail to Permit Access Because of Malfunction,
>Damage or Obsoleteness."
If you ask me, Linux, FreeBSD, OpenBSD, and NetBSD are the wave of
the future. If my forward-looking computer ca
According to the Daily Telegraph, the US took most of the credit for
breaking Japanese codes during WWII. The paper says that Bletchley
Park deserves more credit according to recently declassified papers.
Only traditional British reticence kept them from claiming credit
before.
http://www.te
Is making an SSL connection creating a VPN? It's really not much
different in an abstract sense. Most applications are using browsers
as interfaces anyway. So I think this will only encourage businesses
to set up SSL server/client models instead of general VPNs.
-Peter
--
---
Looks like the FBI is between a rock and a hard place. If they keep
pushing Calea, they force the engineers to make it super easy for
people to spy on the US. Why bother to send folks skulking around in
the middle of the night when you can just buy a backbone provider?
You might even make so
Has anyone experimented with writing crypto code in Java using the
BigInteger class? It's a nice package with plenty of neat functions,
but I haven't played with it yet. Is it fast enough? I'm really
curious about the speed.
-Peter
Has anyone experimented with writing crypto code in Java using the
BigInteger class? It's a nice package with plenty of neat functions,
but I haven't played with it yet. Is it fast enough? I'm really
curious about the speed.
-Peter
--
--
Tune to http://www.wayner.org/
The NSA is announcing that it is "laying off" about 2000 people. They
will be replaced by outside contractors. Here's the story in the
Baltimore Sun:
http://www.sunspot.net/content/news/story?section=news-maryland-sun&pagename=story&storyid=1150340224903
I think all crypto products rely on passphrases. Every wallet is
locked with a passphrase. Every private key is locked away. Even the
smart cards are usually sewn up with PINs. It's just a fact of life
and it seems unfair to me to pick upon Hushmail.
-Peter
When the news first broke about Sarah Flannery's work on
morphing RSA into matrices defined over finite fields, I
mentioned that I had seen a similar paper earlier. Brian Winkel,
the editor of Cryptologia, did some digging for me and found the
piece in the April 85 issue. It was by Vijay Varadhar
The search software at the NYT leaves much to be desired. If you
enter from the front page, it assumes you only want to search
TODAY's copy of the paper. You have to re-search and click on
the whole archives. Of course, that often yields too many
articles to wade through.
For speed, here's the
14 matches
Mail list logo