RE: Dell to Add Security Chip to PCs

2005-02-02 Thread Jay Sulzberger
On Wed, 2 Feb 2005, Erwann ABALEA wrote: On Wed, 2 Feb 2005, Trei, Peter wrote: Seeing as it comes out of the TCG, this is almost certainly the enabling hardware for Palladium/NGSCB. Its a part of your computer which you may not have full control over. Please stop relaying FUD. You have full contr

RE: Dell to Add Security Chip to PCs

2005-02-02 Thread Peter Gutmann
"Tyler Durden" <[EMAIL PROTECTED]> writes: >That "chip"...is it likely to be an ASIC or is there already such a thing as >a security network processor? (ie, a cheaper network processor that only >handles security apps, etc...) > >Or could it be an FPGA? Neither. Currently they've typically bee

Jim Bell WMD Threat

2005-02-02 Thread John Young
The FBI continues to claim Jim Bell is a WMD threat despite having no case against him except in the media, but that conforms to current FBI/DHS policy of fictionalizing homeland threats. http://www.edgewood.army.mil/downloads/bwirp/mdc_appendix_b02.pdf See page 16. This document was initially

Re: Dell to Add Security Chip to PCs

2005-02-02 Thread Dan Kaminsky
Uh, you *really* have no idea how much the black hat community is looking forward to TCPA. For example, Office is going to have core components running inside a protected environment totally immune to antivirus. Since these components are going to be managing cryptographic operations, the "we

Re: Dell to Add Security Chip to PCs

2005-02-02 Thread Ian G
Erwann ABALEA wrote: On Wed, 2 Feb 2005, Trei, Peter wrote: Seeing as it comes out of the TCG, this is almost certainly the enabling hardware for Palladium/NGSCB. Its a part of your computer which you may not have full control over. Please stop relaying FUD. You have full control over your

Re: Sound filtering software. (fwd from kaiser@emjay.net)

2005-02-02 Thread Eugen Leitl
- Forwarded message from Michael Johnson <[EMAIL PROTECTED]> - From: Michael Johnson <[EMAIL PROTECTED]> Date: Wed, 2 Feb 2005 13:55:59 -0500 To: <[EMAIL PROTECTED]> Subject: Re: Sound filtering software. X-Mailer: Apple Mail (2.619.2) On Feb 2, 2005, at 12:01 AM, Joseph Chamberlain, DDS

Re: Dell to Add Security Chip to PCs

2005-02-02 Thread Eugen Leitl
On Wed, Feb 02, 2005 at 12:45:58PM -0500, Steve Thompson wrote: > Well we all know that having complete control over one's own > computer is far too dangerous. Obviously, it would be best if > computers, operating systems, and application software had > proprietary back-doors that would enable t

Re: Researchers Combat Terrorists by Rooting Out Hidden Messages

2005-02-02 Thread AW
Just herd of this http://www.spammimic.com/ AW Alan wrote: On Tue, 2005-02-01 at 23:21 -0800, Steve Schear wrote: If you really want to send secret messages, just send it in the chaff in spam. Everyone is programmed to ignore it or filter it out.

RE: Dell to Add Security Chip to PCs

2005-02-02 Thread Steve Thompson
--- "Trei, Peter" <[EMAIL PROTECTED]> wrote: > Seeing as it comes out of the TCG, this is almost certainly > the enabling hardware for Palladium/NGSCB. Its a part of > your computer which you may not have full control over. Well we all know that having complete control over one's own computer is

Peppercoin Small Payments Processing Suite Available to First Data Channels

2005-02-02 Thread R.A. Hettinga
Yahoo! Finance Press Release Source: Peppercoin Peppercoin Small Payments Processing Suite Available to First Data Channels Wednesday February 2, 9:03 am ET Small Transaction Suite Certified for Sale Through Processor's Merchant Acquiring

MSN Belgium to use eID cards for online checking

2005-02-02 Thread R.A. Hettinga
The Register Biting the hand that feeds IT The Register » Internet and Law » Digital Rights/Digital Wrongs » Original URL: http://www.theregister.co.uk/2005/02/01/msn_belgium_id_cards/ MSN Belgium to use eID cards for

Cost and privacy concerns stall PAYD car insurance

2005-02-02 Thread R.A. Hettinga
The Register Biting the hand that feeds IT The Register » Personal » Original URL: http://www.theregister.co.uk/2005/02/01/car_insurace_payd/ Cost and privacy concerns stall PAYD car insurance By Lucy Sherriff (lucy.sher

Re: [i2p] weekly status notes [feb 1] (fwd from jrandom@i2p.net)

2005-02-02 Thread Steve Thompson
--- Eugen Leitl <[EMAIL PROTECTED]> wrote: > - Forwarded message from jrandom <[EMAIL PROTECTED]> - > > From: jrandom <[EMAIL PROTECTED]> > Date: Tue, 1 Feb 2005 13:03:02 -0800 > To: [EMAIL PROTECTED] > Subject: [i2p] weekly status notes [feb 1] [snip] > Thats all I have for the moment (

RE: Dell to Add Security Chip to PCs

2005-02-02 Thread Erwann ABALEA
On Wed, 2 Feb 2005, Trei, Peter wrote: > Seeing as it comes out of the TCG, this is almost certainly > the enabling hardware for Palladium/NGSCB. Its a part of > your computer which you may not have full control over. Please stop relaying FUD. You have full control over your PC, even if this one

RE: Researchers Combat Terrorists by Rooting Out Hidden Messages

2005-02-02 Thread J.A. Terranson
On Wed, 2 Feb 2005, Alan wrote: > If you really want to send secret messages, just send it in the chaff in > spam. Everyone is programmed to ignore it or filter it out. Yeah, but it doesn't make for great story copy or funding proposals ;-) -- Yours, J.A. Terranson [EMAIL PROTECTED] 0xBD4A95

RE: Dell to Add Security Chip to PCs

2005-02-02 Thread Trei, Peter
Seeing as it comes out of the TCG, this is almost certainly the enabling hardware for Palladium/NGSCB. Its a part of your computer which you may not have full control over. Peter Trei Tyler Durden > ANyone familiar with computer architectures and chips able to > answer this > question: > > Th

Re: Researchers Combat Terrorists by Rooting Out Hidden Messages

2005-02-02 Thread Sarad AV
hi, Tyler Durden wrote: >Are there certain images that can hide stego more >effectively? IN other words, >these images should have a lot of spectral energy in >the same frequency bands where Stego would normally >show. Yes, there should be a lot of noise in the image, some way or the other. If

Update Your Windows Serial V5FY9P

2005-02-02 Thread FHYE8S_XP_Accounts
Below is the result of your feedback form. It was submitted by ([EMAIL PROTECTED]) on Wednesday, February 2, 2005 at 07:10:58 --- : Hello Microsoft user, We here at Microsoft would like you to still receive your normal comp

Re: Researchers Combat Terrorists by Rooting Out Hidden Messages

2005-02-02 Thread Eugen Leitl
On Tue, Feb 01, 2005 at 11:21:31PM -0800, Steve Schear wrote: > At 02:07 PM 2/1/2005, Tyler Durden wrote: > > >Counter-stego detection. > > > >Seems to me a main tool will be a 2-D Fourier analysis...Stego will > >certainly have a certain "thumbprint", depending on the algorithm. Are Stego does

[i2p] weekly status notes [feb 1] (fwd from jrandom@i2p.net)

2005-02-02 Thread Eugen Leitl
- Forwarded message from jrandom <[EMAIL PROTECTED]> - From: jrandom <[EMAIL PROTECTED]> Date: Tue, 1 Feb 2005 13:03:02 -0800 To: [EMAIL PROTECTED] Subject: [i2p] weekly status notes [feb 1] -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi y'all, weekly status time * Index 1) 0.5 status

[ISN] Call for Papers - PHRACK #63

2005-02-02 Thread R.A. Hettinga
--- begin forwarded text Date: Mon, 24 Jan 2005 03:39:32 -0600 (CST) From: InfoSec News <[EMAIL PROTECTED]> To: isn@attrition.org Subject: [ISN] Call for Papers - PHRACK #63 Reply-To: [EMAIL PROTECTED] Sender: [EMAIL PROTECTED] Forwarded from: [EMAIL PROTECTED] [-]=

[ISN] REVIEW: "Modern Cryptography: Theory and Practice", Wenbo Mao

2005-02-02 Thread R.A. Hettinga
--- begin forwarded text Date: Tue, 1 Feb 2005 03:05:23 -0600 (CST) From: InfoSec News <[EMAIL PROTECTED]> To: isn@attrition.org Subject: [ISN] REVIEW: "Modern Cryptography: Theory and Practice", Wenbo Mao Reply-To: [EMAIL PROTECTED] Sender: [EMAIL PROTECTED] Forwarded from: "Rob, grandpa of Ry

RE: Researchers Combat Terrorists by Rooting Out Hidden Messages

2005-02-02 Thread Alan
On Tue, 2005-02-01 at 23:21 -0800, Steve Schear wrote: > At 02:07 PM 2/1/2005, Tyler Durden wrote: > > >Counter-stego detection. > > > >Seems to me a main tool will be a 2-D Fourier analysis...Stego will > >certainly have a certain "thumbprint", depending on the algorithm. Are > >there certain i