On Thu, 2015-11-19 at 06:21 +, mtm wrote:
> how did hominids manage prior to crypto?
The same way we managed before writing -- ciphers of various kinds have
been in use for all of recorded history.
-- Ben
signature.asc
Description: This is a digitally signed message part
__
On Sun, 2014-10-26 at 10:35 +, ianG wrote:
> On 22/10/2014 03:22 am, Jason Iannone wrote:
> > On a fundamental level I wonder why privacy is important and why we
> > should care about it.
>
>
> Financial privacy is all about theft. If someone knows where the money
> is, it can be stolen. It
On Tue, 24 Dec 2013 21:36:46 -0500
Peter Todd wrote:
> On Tue, Dec 24, 2013 at 07:43:12PM -0500, Greg wrote:
> > I'm curious, is Aaron's response representative of the entire
> > list's, or are there folks out there lurking who would actually
> > appreciate a forum?
> >
> > Show of hands?
>
> I
On Tue, 24 Dec 2013 19:56:32 -0500
Greg wrote:
> It would be interesting, actually, to see whether the list's software
> could be automatically integrated with a forum like SMF.
Nobody needs to modify the list's software. You can just have your
forum's web server receive the mailing list's mess
On Tue, 24 Dec 2013 18:40:29 -0500
Greg wrote:
> K, ya'll got some recommendations?
Stick with the mailing list. If we are going to move anywhere, it
should be toward something like a moderated Usenet newsgroup (if not
actually moving to Usenet).
> Also, do you enjoy not being able to edit you
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On Tue, 24 Dec 2013 16:44:24 -0500
Greg wrote:
> Thoughts?
Can we please *not* do this? Web forums are horribly annoying places
where we must deal with some other person's conception of what a good
client should look like.
Frankly, after everyth
On Mon, 18 Nov 2013 12:58:40 -0500
Thierry Moreau wrote:
> Then you lose the better theoretical foundations of probabilistic
> signature schemes ...
Deterministic signature schemes are not without their theoretical
merits e.g. Merkle trees.
-- Ben
--
Benjamin R Kreuter
KK4FJZ
--
"If larg
On Mon, 18 Nov 2013 10:27:30 +0300
ianG wrote:
> Vendors should make their encryption code public, including the
> protocol specifications. This will allow others to examine the code
> for vulnerabilities.
I would add to this that simpler code is better. The Underhanded C
Coding Contest s
On Sat, 17 Aug 2013 12:30:40 +0300
ianG wrote:
> This was always known as the weakness of the model. The operator
> could simply replace the applet that was downloaded in every instance
> with one that had other more nefarious capabilities. There were
> thoughts and discussions about how to avo
On Tue, 21 May 2013 14:17:02 +1000
"James A. Donald" wrote:
> Police install malware by black bagging, and by the same methods as
> botnets. Both methods are noticeable.
I do not think the following scenario is terribly far-fetched:
Suppose the police want to target a grad student in a CS dep
On Sat, 28 Apr 2012 16:31:10 +1000
"James A. Donald" wrote:
> On 2012-04-28 4:05 PM, ianG wrote:
> > Yes. Let's talk about traffic analysis - how are we going to
> > mitigate traffic analysis? That's much more interesting.
>
> Assume everything is encrypted. Then stuff that is not time urgent
>
On Sat, 24 Mar 2012 02:29:30 -0500
Marsh Ray wrote:
> If you're looking for someplace to feel subversive around, this isn't
> it. Crypto is a mainstream engineering discipline these days, and one
> greatly needed by modern civilization.
Unfortunately, there is still a great deal of resistance
On Sun, 26 Feb 2012 11:00:15 -0500
"Bill St. Clair" wrote:
> On Sun, Feb 26, 2012 at 10:08 AM, Benjamin Kreuter
> wrote:
> > On Sun, 26 Feb 2012 08:48:05 -0500
> > d...@geer.org wrote:
>
> > Money and government go hand in hand. Governments need money in
&
On Sun, 26 Feb 2012 17:57:14 +1000
"James A. Donald" wrote:
> > On 2012-02-26 1:18 AM, Benjamin Kreuter wrote: The demand
> > for Bitcoin as a currency is driven by its properties as a
> > digital cash system; people still need to get their
> > nation&
On Sun, 26 Feb 2012 08:48:05 -0500
d...@geer.org wrote:
>
> Well put, James. Warren Buffet's arguments are, to my eye,
> aligned with yours. He argues that gold has no intrinsic
> value, unlike farmland or a company like Coca Cola. In that
> way, his evaluation is as instrumentalist as is your
On Sat, 25 Feb 2012 13:36:50 +1000
"James A. Donald" wrote:
> On 2012-02-25 12:53 PM, ianG wrote:
> > It is also a singular lesson in the emotive power of cryptography
> > to encourage large numbers of people to hash their intelligent
> > thought processes. What we are seeing is otherwise rati
On Sat, 25 Feb 2012 05:30:57 +1000
"James A. Donald" wrote:
> So: Don't talk to police about the contents of your drive, or indeed
> anything of which they might potentially disapprove.
I believe that you meant to say, "Don't talk to the police at all,"
which should be standard policy for anyo
On Sun, 19 Feb 2012 17:08:25 +0100
Florian Weimer wrote:
> * Saqib Ali:
>
> > Can somebody explain me how this so-called Homomorphic split-key
> > encryption works?
>
> Isn't this just a protocal which performs a cryptographic primitive
> using split key material, without actually recombining t
On Sun, 12 Feb 2012 05:57:02 -0500
Jeffrey Walton wrote:
> On Sun, Feb 12, 2012 at 5:43 AM, Krassimir Tzvetanov
> wrote:
> > While I'm not a lawyer and my opinion is in noway authoritive I do
> > not believe there is any violation. They ay be an accessory to a
> > potential crime but they themse
On Mon, 16 Jan 2012 18:47:06 +1300
Peter Gutmann wrote:
> Harald Hanche-Olsen writes:
>
> >Maybe it's just me, but I find myself unable to make sense of this
> >part:
> >
> > [...] one mathematical vulnerability in the RSA encryption
> > algorithm related to changing the base numbering system
On Tue, 10 Jan 2012 21:34:53 +0100
Florian Weimer wrote:
> * Thierry Moreau:
>
> > [D] The GPL V3 compliance would forbid any transfer of such
> > gplv3-turned-proprietary ROM-based equipment outside of the
> > organization (one would put back the original ROM version as part of
> > IT equipment
On Sun, 8 Jan 2012 22:46:13 -0500
Jeffrey Walton wrote:
> Hi All,
>
> I was reading on CyanogenMod (a custom ROM project for Android) and
> "The story behind the mysterious CyanogenMod update"
> (http://lwn.net/Articles/448134/).
>
> Interestingly, it seems some privaye keys were circulated to
On Tue, 6 Dec 2011 12:34:37 +0100
Adam Back wrote:
> Kids figure this stuff out getting through site restrictions on
> school wifi also. Some schools try to block popular web games.. eg
> runescape.
Let us not discourage either the children or the schools! This sounds
like an excellent way for
On 09/18/2011 05:11 PM, Marsh Ray wrote:
> B. If your threat model considers as an adversary government A, then
> you're in good company with governments B through Z. So all the comments
> on "won't save you from The Government", while true, are also
> potentially writing off your biggest ally.
Un
On 09/18/2011 03:30 PM, Joe St Sauver wrote:
> Ian asked:
>
> #Right -- how to fix the race to the bottom?
>
> Wasn't that supposed to be part of the Extended Validation solution?
>
> If it has failed at that, and I could see arguments either way, the
> other "natural" solution is probably gover
25 matches
Mail list logo