Peter Gutmann wrote:
> ... to a statistically irrelevant bunch of geeks.
> Watch Skype deploy a not- terribly-anonymous (to the
> people running the Skype servers) communications
> system.
Actually that is pretty anonymous. Although I am sure
that Skype would play ball with any bunch of goons th
Nicolas Williams wrote:
> Providing a suitable e-mail security solution for the
> masses strikes me as more important than providing
> anonymity to the few people who want or need it. Not
> that you can't have both, unless you want everyone to
> use PGP or S/MIME as a way to hide anonymized traff
On Dec 17, 2008, at 3:18 PM, Perry E. Metzger wrote:
I'd like to expand on a point I made a little while ago about the
"just throw everything at it, and hope the good sources drown out the
bad ones" entropy collection strategy.
The biggest problem in security systems isn't whether you're using
On Wed, Dec 17, 2008 at 03:02:54PM -0500, Perry E. Metzger wrote:
> The longer I'm in this field, the more the phrase "use with extreme
> caution" seems to mean "don't use" to me. More and more, I think that
> if you don't have a really good way to test and get assurance about a
> component of your
Charles Jackson wrote:
>
> I probably should not be commenting, not being a real device guy. But,
> variations in temperature and time could be expected to change SSD timing.
> Temperature changes will probably change the power supply voltages and shift
> some of the thresholds in the devices.