On Wed, 14 Sep 2005 10:06:21 -0400, Trei, Peter said:
> This technique is decades old. I read an account of the British
> Secret Service (MI5? 6?) installing a bugged phone next to a
> cable machine in the London Soviet Embassy in the late 70's, but
MI5, early 60's or even late 50's. Described
On Tue, 7 Sep 2004 13:24:39 +0800, Padraig MacIain said:
> problem. However, does it offer a great risk for something like
> OpenPGP if the passphrase used to access the secretkey is partially
That depends on quality of the passphrase; it makes dictionary attacks
easier.
> compromised? And in t
On Fri, 11 Jun 2004 14:23:18 -0400, An Metet said:
> int /* outlen */
> enc64 (char *out, unsigned char *in, int inlen)
Please add an argument for the available size of the buffer OUT and
check this length while encoding. Over short or long someone will for
sure use your function and forget
On Mon, 17 Nov 2003 21:48:16 +0100 (CET), Thomas Shaddack said:
> Subject: OpenLinux: Key validity bug in GnuPG 1.2.1 and earlier
> Advisory number: CSSA-2003-034.0
> Issue date: 2003 November 17
Cool SCO: One of the earliest advisories I have ever seen. The fixed
Gnu
On Thu, 23 May 2002 10:34:22 -0400, Adam Shostack said:
> Is there any Open source implementation of the protocol?
Well, there is a Free Software implementation called NewPG which
provides a backend called gpgsm - very similar to gpg. It is
currently under development but we already exchanged e