--- begin forwarded text
Delivered-To: [EMAIL PROTECTED]
Date: Wed, 19 Oct 2005 23:33:54 -0400
To: Philodox Clips List [EMAIL PROTECTED]
From: R.A. Hettinga [EMAIL PROTECTED]
Subject: [Clips] Bruce Schneier talks cyber law
Reply-To: [EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]
--- begin forwarded text
Delivered-To: [EMAIL PROTECTED]
Date: Wed, 19 Oct 2005 23:32:55 -0400
To: Philodox Clips List [EMAIL PROTECTED]
From: R.A. Hettinga [EMAIL PROTECTED]
Subject: [Clips] Read two biometrics, get worse results - how it works
Reply-To: [EMAIL PROTECTED]
Sender: [EMAIL
Hello,
I would like to notify you all of a new mailing list forum which I
opened. It is called Practical Security and is aimed at discussing
security measures in the context of real problems in real projects.
It has a much narrower scope than the Cryptography mailing list and
by no means
RAH, et al.,
It is true that one can combine two diagnostic
tests to a worse effect than either alone, but
it is not a foredrawn conclusion. To take a
medical example, you screen first with a cheap
test that has low/no false negatives then for the
remaining positives you screen with a
On 10/19/05, R.A. Hettinga [EMAIL PROTECTED] wrote:
[EDIT]
Daugman presents
(http://www.cl.cam.ac.uk/users/jgd1000/combine/combine.html) the two rival
intuitions, then does the maths. On the one hand, a combination of
different tests should improve performance, because more information
* Perry E. Metzger:
Via cryptome:
http://evilscientists.de/blog/?page_id=343
The Cisco VPN Client uses weak encryption to store user and group
passwords in your local profile file. I coded a little tool to
reveal the saved passwords from a given profile file.
If this is true,
http://www.cisco.com/en/US/products/hw/vpndevc/ps2284/products_configuration_guide_chapter09186a00803ee1f0.html#wp2477015
- - -
Cisco Client Parameters
Allow Password Storage on Client - Check this box to allow IPSec
clients to store their login passwords on their local
On Thu, 20 Oct 2005, cyphrpunk wrote:
system without excessive complications. Only the fifth point, the
ability for outsiders to monitor the amount of cash in circulation, is
not satisfied. But even then, the ecash mint software, and procedures
and controls followed by the issuer, could be