Re: Is this the first ever practically-deployed use of a threshold scheme?

2010-08-11 Thread mhey...@gmail.com
On Sun, Aug 1, 2010 at 7:10 AM, Peter Gutmann wrote: > ...does anyone know of any significant use [of split keys] by > J.Random luser?  I'm interested in this from a usability point > of view. > Maybe not J.Random but J.Corporate... A few jobs ago back in the late '90s, I worked for Network Assoc

Re: A mighty fortress is our PKI, Part II

2010-08-11 Thread Peter Gutmann
Thor Lancelot Simon writes: >If you want to see a PKI tragedy in the making, have a look at the CRLs used >by the US DoD. Only "in the making"? Actually it's all relative, in Japan the Docomo folks turned off CRLs because they found that even a relatively modest CRL (not just the DoD monsters)

Re: A mighty fortress is our PKI, Part II

2010-08-11 Thread Thor Lancelot Simon
On Wed, Aug 04, 2010 at 10:46:44PM -0700, Jon Callas wrote: > > I think you'll have to agree that unlike history, which starts out as > tragedy and replays itself as farce, PKI has always been farce over the > centuries. It might actually end up as tragedy, but so far so good. I'm > sure that if w

Fwd: Re: new tech report on easy-to-use IPsec

2010-08-11 Thread Adam Aviv
I think the list may get a kick out of this. The tech-report was actually posted on the list previously, which is where I found it. Link included for completeness. http://mice.cs.columbia.edu/getTechreport.php?techreportID=1433 Original Message Subject: Re: new tech report on

Re: "Cars hacked through wireless tire sensors"

2010-08-11 Thread dan
| | Unlike the work earlier this year, these attacks are more of a | nuisance than any real danger; the tire sensors only send a message | every 60-90 seconds, giving attackers little opportunity to compromise | systems or cause any real damage. Nonetheless, both pieces of research