I just heard very unfortunate news about some intellectual property
dispute between Open Whisper Systems and another company.
I won't link to it here, I don't think it would do any good.
It's a strange story. The double ratchet protocol specification is
dedicated to the public domain, the refere
On Sat, 19 Jul 2014 02:45:05 +0300 (EEST)
Sampo Syreeni wrote:
> So what *is* it with you people? Can't you see that steganography really
> starts and ends with information and coding theory, unlike cryptography?
> Its bounds really necessarily and from the start have to do with noise
> and un
On Fri, 2014-04-25 at 09:28 -0700, Tony Arcieri wrote:
> There's an entire class of memory safety bugs which are possible in C but
> not possible in Rust. These also happen to be the class of bugs that lead
> to Heartbleed-like secret leakage or remote code execution vulnerabilities.
It seems we'
On Tue, 2014-01-14 at 23:57 -0500, grarpamp wrote:
> I believe there is sufficient demand to merit deployment of a
> good mix network. As well as perhaps web/other intake frontends
> due to the now prevalent a) dwindling free email b) demand by
> mail providers for phone authentication. As for ope
On Sun, 2013-11-03 at 04:17 +, Roth Paxton wrote:
> Cryptographyuniversal.com is my website.@Niko. I accept your criticism
> and you are correct that I was angry at the IACR when the site was
> published. However I am only an amatuer cryptographer. Some of the
> math is wrong. The site is mere
On Fri, 2013-10-18 at 10:18 +0100, Ben Laurie wrote:
> On 14 October 2013 14:36, Eugen Leitl wrote:
> >
> > Guys, in order to minimize Tor Project's dependance on
> > federal funding
>
> Why?
Because a diversity of funding is better than a single source of funding
-- especially when that single
On Wed, 2013-09-25 at 10:11 -0400, John Young wrote:
> [Answer to the question:] "Does there exist an unbreakable cipher"
> would be this, "Every cipher is breakable, given enough traffic, and
> every cipher is unbreakable, if the traffic volume is restricted
> enough."
>
> [End quote]
>
> Is
On 2013-08-20, at 3:31 PM, Fabio Pietrosanti (naif) wrote:
> Hi all,
>
> at GlobaLeaks we are going to implement a feature that want to
> mitigate time correlation attacks between a Whistleblower submitting
> something and a Receiver, receiving a notification that there's a new
> leak outstanding
On 2013-08-17, at 1:50 PM, Jon Callas wrote:
> On Aug 17, 2013, at 12:49 AM, Bryan Bishop wrote:
>
>> Would providing (signed) build vm images solve the problem of
>> distributing your toolchain?
>
> Maybe. The obvious counterexample is a compiler that doesn't
> deterministically generate code,