* Allen:
Interesting tidbit:
http://www.epaynews.com/index.cgi?survey=ref=browsef=viewid=121516308313743148197block=
Nick Ogden, a Briton who launched one of the world's first e-commerce
processors in 1994, has developed a system for voice-signed financial
transactions. The Voice Transact
Florian Weimer [EMAIL PROTECTED] writes:
Let me rephrase my remark: The trust anchor is conceptually separate
from a root CA certificate.
Conceptually yes, in the same way that the Soviet constitition was
conceptually quite liberal and protective of individual rights.
In practice, no. Look at
Quoting the Foxbusiness article:
PermanentPrivacy announces the world's first practical data
encryption system that is absolutely unbreakable. And is offering a
$1,000,000 challenge to anyone who can crack it.
Permanent Privacy (patent pending) has been verified by Peter
Schweitzer, one of
Arshad Noor wrote:
Florian Weimer wrote:
* Arshad Noor:
http://www.informationweek.com/shared/printableArticle.jhtml?articleID=208800937
On a more serious note, I think the criticism probably refers to the
fact that SKSML does not cryptopgrahically enforce proper key
management. If a
On Mon, Jul 07, 2008 at 07:54:46AM -0700, Ali, Saqib wrote:
PermanentPrivacy announces the world's first practical data
encryption system that is absolutely unbreakable. And is offering a
$1,000,000 challenge to anyone who can crack it.
This reads like snake oil.
Ben Laurie wrote:
Arshad Noor wrote:
I may be a little naive, but can a protocol itself enforce proper
key-management? I can certainly see it facilitating the required
discipline, but I can't see how a protocol alone can enforce it.
I find the question difficult to understand. Before I
On Jul 7, 2008, at 10:54 AM, Ali, Saqib wrote:
Quoting the Foxbusiness article:
PermanentPrivacy announces the world's first practical data
encryption system that is absolutely unbreakable. And is offering a
$1,000,000 challenge to anyone who can crack it.
Permanent Privacy (patent pending)
There are now a number of drives on the market advertising AES based
FDE in hardware, and a number of laptops available on the market that
claim to support them.
Has anyone had any real-world experience with these yet? Are there
standards for how they get the keys from the BIOS or OS? (I'm