Your message
To: conley+AEA-threedog.com
Subject: Stolen
Sent:Thu, 2 Jun 2005 23:53:15 -0500
did not reach the following recipient(s):
conley+AEA-threedog.com on Thu, 2 Jun 2005 23:50:40 -0500
The e-mail account does not exist at the organization this message
was sent to. Che
http://undergroundmedia.org/introducing-torcasting
Introducing Torcasting
The following article is taken from the original Torcasting (to vist site you
must be running Tor setup as your browsers proxy!) site with their permission.
Introduction
With the coming of technologies, or shall I say no
GdY047
Jon Galloway - http://empire.clerklessjm.com/?5n77DaCyFaIJ4BBcantabrigian
6fO986
Gail Morrison - http://stanford.ungirdnd.com/maid?aYccILH7eLNO9aasneeze
- These recipients of your message have been processed by the mail server:
[EMAIL PROTECTED]; Failed; 5.2.2 (mailbox full)
Remote MTA mssczhb-int.msg.bluewin.ch: SMTP diagnostic: 552 RCPT TO:<[EMAIL
PROTECTED]> Mailbox disk quota exceeded
Reporting-MTA: dns; tr11.bluewin.ch
Received-from-M
interesting talk about economic elements ...
I believe that in every human new work (new creation, or new hack), the
men who make the work do things to help others make the work faster and
easier. So with time, if a few people can hack some drm machine, it will
be more easier and more cheaper for
On Thu, Jun 02, 2005 at 11:05:30AM +0200, DiSToAGe wrote:
> I have read infos that say that audio and video drivers will be in the
> trusted chain. If your hardware system is used by an os (i.e. win) on
> which you can't create drivers, and only industry signed drivers can be
> used you can't bypas
>From: DiSToAGe <[EMAIL PROTECTED]>
>Sent: Jun 2, 2005 5:05 AM
>To: [EMAIL PROTECTED]
>Subject: Re: /. [Intel Adds DRM to New Chips]
>I have read infos that say that audio and video drivers will be in the
>trusted chain. If your hardware system is used by an os (i.e. win) on
>which you can't creat
Title: PayPal
Feedback
Assistance
PayPal is committed to
I've been wondering about the feasibility of using SPKI certs. I quite
like some of the features (delegation) and relative ease of
implementation (compared to X.509 certs)...of course, readability of
certs could go a long way to helping end-users evaluate for themselves
the trustworthiness o
On Thu, Jun 02, 2005 at 12:26:09PM +0200, DiSToAGe wrote:
> yes, with "you" I meen "you being an hardware maker"
Yes, the hardware maker hides the secret in a bit of tamperproof hardware you
buy. That's the whole idea of digital restriction management -- taking away
things you could do with the h
Le jeudi 02 juin 2005 à 09:27 +0200, Eugen Leitl a écrit :
> My thought is, can cryptosystems be broken? Not by 31337 h4x0rs, obviously.
>
with time each, but not the general crypto "philosophy" ?
> > cert on your DRM you must put cert and private keys on your DRM chip ...
>
> Not you -- somebo
On Thu, Jun 02, 2005 at 11:05:30AM +0200, DiSToAGe wrote:
> I have read infos that say that audio and video drivers will be in the
> trusted chain. If your hardware system is used by an os (i.e. win) on
> which you can't create drivers, and only industry signed drivers can be
> used you can't bypa
(thanks for interesting answer)
I have read infos that say that audio and video drivers will be in the
trusted chain. If your hardware system is used by an os (i.e. win) on
which you can't create drivers, and only industry signed drivers can be
used you can't bypass this by hacking drivers ...
My
14 matches
Mail list logo