While valid claims (decision about trust is made based on logo, etc.),
similar things happen outside of "cyberspace".
A person goes to AT&T store, with a big logo in front, eventually gives his
credit card information to the person sitting there. That person, maybe an
employee of a dealer / fran
At 7:10 PM -0500 1/15/02, Adam Fields wrote:
>"Arnold G. Reinhold" says:
>> This result would seem to raise questions about SHA1 and MD5 as much
>> as about the quality of /dev/random and /dev/urandom. Naively, it
>> should be difficult to create input to these hash functions that
>> cause their
Eric said,
> I didn't say that it wasn't possible to secure logos. I said that
> you couldn't protect people who trusted logos that were transmitted
> to them in Web pages. This is not the same thing. The point is
> that such logos are transmitted in-band and are part of the web
> page. Therefore
A couple of months ago, a Wall Street Journal reporter bought two
abandoned al Qaeda computers from a looter in Kabul. Some of the
files on those machines were encrypted. But they're dealing with
that problem:
The unsigned report, protected by a complex password, was
created on
--- begin forwarded text
Status: U
Date: Wed, 16 Jan 2002 00:18:11 -0600 (CST)
From: InfoSec News <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Subject: [ISN] Wireless LANs: Trouble in the Air
Sender: [EMAIL PROTECTED]
Reply-To: InfoSec News <[EMAIL PROTECTED]>
http://www.computerworld.com/cwi/
CodeCon is the premier event in 2002 for the P2P, cypherpunk, and
network/security application developer community. It is a workshop for
developers of real-world applications that support individual liberties.
CodeCon registration is $50, a $10 discount is available if you register
prior to Febru
On Tue, 15 Jan 2002 17:25:15 -0800, Will Price said:
> above is as well. That's like saying, "have you stopped beating your
> wife?" I would encourage some objectivity on that.
Huh? Go to the gnupg-users lists archive and search for PGP problems.
You will notice a couple of reports wrt PGP 7.0.
On Tue, Jan 15, 2002 at 09:42:32AM +0100, Axel H Horns wrote:
> On 3 Jan 2070, at 9:41, Nicholas Brawn wrote:
>
> > What's the state of the game with PGP and GPG compatibility?
>
> Interesting question.
>
> I'm using PGP 6.5.8 for my professional confidential e-mails and
> sometimes I get comp
There was an error in the bounds for the runs test specified by NIST; last
october they updated FIPS 140-2 to specify new bounds. An updated version
of my code can be found at http://people.qualcomm.com/ggr/QC/ (our old web
pages are stale, and I'm still trying to have them taken down by our ex