* Eugen Leitl:
Unrelated, IIRC Microsoft changed the architecture of supernodes to allow
for lawful interception with Skype.
Skype supports transparent call forwarding, so lawful intercept is
possible as well. It's just a question of how much about the
interception activity leaks to the
On 05/29/2012 06:01 PM, Maarten Billemont wrote:
Dear readers,
I've written an iOS / Mac application whose goal it is to produce
passwords for any purpose. I was really hoping for the opportunity
to receive some critical feedback or review of the algorithm
used[1].
[1]
On 30 May 2012 05:01, ianG i...@iang.org wrote:
On 29/05/12 11:03 AM, Peter Maxwell wrote:
On 29 May 2012 01:35, Peter Gutmann pgut...@cs.auckland.ac.nz
mailto:pgut...@cs.auckland.ac.nz wrote:
Peter Maxwell pe...@allicient.co.uk mailto:pe...@allicient.co.uk
writes:
Why on