On 2014-07-11 07:45, Kevin wrote:
On 7/10/2014 4:39 PM, John Young wrote:
https://blog.silentcircle.com/why-are-we-competing-with-phone-makers-skype-and-telecom-carriers-all-in-the-same-week/
With silent circle, when Ann talks to Bob, does Ann get Bob's public key
from silent circle, and Bob
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 11/07/14 11:27, James A. Donald wrote:
On 2014-07-11 07:45, Kevin wrote:
On 7/10/2014 4:39 PM, John Young wrote:
https://blog.silentcircle.com/why-are-we-competing-with-phone-makers-skype-and-telecom-carriers-all-in-the-same-week/
With
On 11/07/2014 11:27 am, James A. Donald wrote:
On 2014-07-11 07:45, Kevin wrote:
On 7/10/2014 4:39 PM, John Young wrote:
https://blog.silentcircle.com/why-are-we-competing-with-phone-makers-skype-and-telecom-carriers-all-in-the-same-week/
With silent circle, when Ann talks to Bob, does Ann
On 2014-07-11 20:59, Michael Rogers wrote:
For phone calls they use ZRTP, so Ann and Bob can verbally compare
short authentication strings after the key exchange to detect a MITM,
*if* they know each other's voices and their voices can't be faked.
ZRTP carries keying material forward from one
ianG i...@iang.org writes:
On 11/07/2014 11:27 am, James A. Donald wrote:
On 2014-07-11 07:45, Kevin wrote:
On 7/10/2014 4:39 PM, John Young wrote:
https://blog.silentcircle.com/why-are-we-competing-with-phone-makers-skype-and-telecom-carriers-all-in-the-same-week/
With silent circle, when
On 07/11/2014 04:23 PM, StealthMonger wrote:
While I'm interested in how they're doing that, I'm far more interested
in how Ann convinces Bob that she is Ann, and Bob convinces Ann that he
is Bob. We left the OpenPGP/cert building a long time ago, we need more
than just 1980s PKI ideas with
https://blog.silentcircle.com/why-are-we-competing-with-phone-makers-skype-and-telecom-carriers-all-in-the-same-week/
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography
On 7/10/2014 4:39 PM, John Young wrote:
https://blog.silentcircle.com/why-are-we-competing-with-phone-makers-skype-and-telecom-carriers-all-in-the-same-week/
___
cryptography mailing list
cryptography@randombit.net
This is the comsec dilemma. If a product or system becomes mainstream
it is more likely to be overtly and/or covertly compromised. If marginal it
is likely to be used by few and consequently not well tested against
overt and/or covert faults and compromise, may go out of of business,
or aquired
On 10 July 2014 22:39:01 CEST, John Young j...@pipeline.com wrote:
https://blog.silentcircle.com/why-are-we-competing-with-phone-makers-skype-and-telecom-carriers-all-in-the-same-week/
I think a lot of the stuff Silent Circle is doing looks great; but I think we
need a real open OS (perhaps
On Thu, Jul 10, 2014 at 4:45 PM, John Young j...@pipeline.com wrote:
This is the comsec dilemma. If a product or system becomes mainstream
it is more likely to be overtly and/or covertly compromised.
This is why it's important the client is open source, the binaries are
reproducible, and the
On Thu, Jul 10, 2014 at 10:52 PM, Tony Arcieri basc...@gmail.com wrote:
On Thu, Jul 10, 2014 at 4:45 PM, John Young j...@pipeline.com wrote:
This is the comsec dilemma. If a product or system becomes mainstream
it is more likely to be overtly and/or covertly compromised.
I don't find this a
12 matches
Mail list logo