On Apr 9, 2010, at 3:06 PM, Perry E. Metzger wrote:
>
> Earlier this weeks, Wikileaks released of video of an incident involving
> an Apache helicopter which killed two Reuters reporters and a number of
> bystanders in Iraq.
>
> A number of the reports surrounding the release claim that the vide
On Aug 28, 2009, at 8:25 PM, R.A. Hettinga wrote:
...and now GPG.
So, Snow Leopard is crypto-less?
To be strictly accurate, the problem is with GPGMail, the plugin that
integrates GPG with Apple's Mail application (as Mail internals
changed significantly between Leopard and Snow Leopa
On Sat, Sep 16, 2006 at 12:35:08PM +1000, James A. Donald wrote:
> --
> Peter Gutmann wrote:
> > > How does [GPG] handle the NULL vs.optional
> > > parameters ambiguity?
>
> David Shaw:
> > GPG generates a new structure for each comparison, so
> > ju
On Sat, Sep 16, 2006 at 05:35:27AM +1200, Peter Gutmann wrote:
> David Shaw <[EMAIL PROTECTED]> writes:
>
> >Incidentally, GPG does not attempt to parse the PKCS/ASN.1 data at all.
> >Instead, it generates a new structure during signature verification and
> >compare
On Fri, Sep 15, 2006 at 08:49:31PM +1200, Peter Gutmann wrote:
> When I fired up Firefox a few minutes ago it told me that there was
> a new update available to fix security problems. I thought, "Hmm, I
> wonder what that would be...". It's interesting to note that we now
> have fixes for many o
On Wed, Apr 26, 2006 at 09:53:27PM -0400, Steven M. Bellovin wrote:
> In an article on disk encryption
> (http://www.theregister.co.uk/2006/04/26/pgp_infosec/), the following
> paragraph appears:
>
> BitLocker has landed Redmond in some hot water over its insistence
> that there are no
On Tue, Sep 14, 2004 at 10:31:11AM +0200, Eugen Leitl wrote:
>
> I'm looking for (cheap, PCI/USB) hardware to store secrets (private
> key) and support crypto primitives (signing, cert generation). It
> doesn't have to be fast, but to support loading/copying of secrets
> in physically secure envir
I have reproduced both MD4 collisions from the recent paper. The
example given had endian problems similar to those noted by Eric
Rescorla for the sorta-MD5 collision. Also similar to Eric's results,
the hash value (while a collision) does not match what the authors
give in the paper.
Example on
On Thu, Dec 04, 2003 at 05:29:32PM -0500, Steve Bellovin wrote:
>
> --- Forwarded Message
>
> Date: Tue, 02 Dec 2003 13:40:32 -0500
> To: [EMAIL PROTECTED]
> From: Elaine Barker <[EMAIL PROTECTED]>
> Subject: Additional Proposed Hash Function
>
> NIST is proposing a change notice for FIPS 18
On Tue, Aug 19, 2003 at 11:57:32AM -0400, Tim Dierks wrote:
> Is there a definitive or highly recommended paper or book on the design of
> PRNGs?
>
> I'm assuming a cryptographic PRNG of the type in OpenSSL, PGP, etc., where
> entropic seeding data is accumulated into a pool and output is produc
On Wed, Jun 18, 2003 at 03:47:01PM +0200, Stefan Kelm wrote:
> David,
>
> > A reasonable question would be "Why don't all the PKS operators
> > replace their server with SKS or something else?". I don't have a
> > good answer to that. It's certainly been asked.[3]
>
> ...and has been answered a
On Tue, Jun 17, 2003 at 11:42:13PM +0200, martin f krafft wrote:
> My key, 220BC883330C4A75, has multiple encryption subkeys, and it's
> about to get another one on Friday, as my current encryption key
> expires.
>
> A lot of people are reporting that they cannot encrypt to me, due to
> an unusabl
12 matches
Mail list logo