Re: Thanks, Lucky, for helping to kill gnutella

2002-08-11 Thread Paul Crowley
AARG!Anonymous <[EMAIL PROTECTED]> writes: > Be sure and send a note to the Gnutella people reminding them of all > you're doing for them, okay, Lucky? Do the Gnutella people share your feelings on this matter? I'd be surprised. -- __ Paul Crowley \/ o\ [EMAIL PROTECTED] /\__/ http://www.ci

Re: md5 for bootstrap checksum of md5 implementations? (Re: [ANNOUNCE] OpenSSL 0.9.6f released)

2002-08-11 Thread Roy M . Silvernail
On Friday 09 August 2002 12:23 pm, Barney Wolff <[EMAIL PROTECTED]>wrote: > Does anybody offer a public MD5 web service? Though if your omnipotent > attacker sits between you and the world, this does no good. For the hell of it, I knocked together this: http://www.scytale.com/cgi-bin/md5.cgi

Re: dangers of TCPA/palladium

2002-08-11 Thread Ben Laurie
AARG!Anonymous wrote: > Adam Back writes: > > >>- Palladium is a proposed OS feature-set based on the TCPA hardware >>(Microsoft) > > > Actually there seem to be some hardware differences between TCPA and > Palladium. TCPA relies on a TPM, while Palladium uses some kind of > new CPU mode. Pa

Re: Thanks, Lucky, for helping to kill gnutella

2002-08-11 Thread Sean Smith
Actually, our group at Dartmouth has an NSF "Trusted Computing" grant to do this, using the IBM 4758 (probably with a different OS) as the hardware. We've been calling the project "Marianas", since it involves a chain of islands. --Sean >If only there were a technology in which clients coul

Re: TCPA/Palladium -- likely future implications (Re: dangers ofTCPA/palladium)

2002-08-11 Thread Peter Fairbrother
Adam Back wrote: [...] > - It is always the case that targetted people can have hardware > attacks perpetrated against them. (Keyboard sniffers placed during > court authorised break-in as FBI has used in mob case of PGP using > Mafiosa [1]). [...] > [1] "FBI Bugs Keyboard of PGP-Using Alleged

Re: Seth on TCPA at Defcon/Usenix

2002-08-11 Thread John Gilmore
> It reminds me of an even better way for a word processor company to make > money: just scramble all your documents, then demand ONE MILLION DOLLARS > for the keys to decrypt them. The money must be sent to a numbered > Swiss account, and the software checks with a server to find out when > the

Re: Thanks, Lucky, for helping to kill gnutella

2002-08-11 Thread R. A. Hettinga
I'm genuinely sorry, but I couldn't resist this... At 12:35 PM -0400 on 8/11/02, Sean Smith wrote: > Actually, our group at Dartmouth has an NSF "Trusted Computing" > grant to do this, using the IBM 4758 (probably with a different > OS) as the hardware. > > We've been calling the project "Maria

Re: Thanks, Lucky, for helping to kill gnutella

2002-08-11 Thread Sean Smith
i guess it's appropriate that the world's deepest hole is next to something labelled a "trust territory" :) --Sean :) - The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTEC

Re: Extracting uniform randomness from noisy source

2002-08-11 Thread John Kelsey
At 11:09 PM 8/7/02 +, David Wagner wrote: >John Kelsey wrote: >>a. If my input samples have enough entropy to make my outputs random, then >>I need to resist computationally unbounded attackers. (Otherwise, why >>bother with distilling entropy; just use a PRNG.) >> >>b. If my input samples