Re: Trojan horse attack involving many major Israeli companies, executives

2005-06-01 Thread Anne Lynn Wheeler
Amir Herzberg wrote: Nicely put, but I think not quite fair. From friends in financial and other companies in the states and otherwise, I hear that Trojans are very common there as well. In fact, based on my biased judgement and limited exposure, my impression is that security practice is much

Re: Dell to Add Security Chip to PCs

2005-02-04 Thread Anne Lynn Wheeler
Peter Gutmann wrote: Neither. Currently they've typically been smart-card cores glued to the MB and accessed via I2C/SMB. and chips that typically have had eal4+ or eal5+ evaluations. hot topic in 2000, 2001 ... at the intel developer's forums and rsa conferences

Re: Dell to Add Security Chip to PCs

2005-02-04 Thread Anne Lynn Wheeler
Erwann ABALEA wrote: I've read your objections. Maybe I wasn't clear. What's wrong in installing a cryptographic device by default on PC motherboards? I work for a PKI 'vendor', and for me, software private keys is a nonsense. How will you convice Mr Smith (or Mme Michu) to buy an expensive CC

Re: Dell to Add Security Chip to PCs

2005-02-04 Thread Anne Lynn Wheeler
Peter Gutmann wrote: Neither. Currently they've typically been smart-card cores glued to the MB and accessed via I2C/SMB. and chips that typically have had eal4+ or eal5+ evaluations. hot topic in 2000, 2001 ... at the intel developer's forums and rsa conferences

Re: Dell to Add Security Chip to PCs

2005-02-04 Thread Anne Lynn Wheeler
Erwann ABALEA wrote: I've read your objections. Maybe I wasn't clear. What's wrong in installing a cryptographic device by default on PC motherboards? I work for a PKI 'vendor', and for me, software private keys is a nonsense. How will you convice Mr Smith (or Mme Michu) to buy an expensive CC

Re: Banks Test ID Device for Online Security

2005-01-06 Thread Anne Lynn Wheeler
Bill Stewart wrote: Yup. It's the little keychain frob that gives you a string of numbers, updated every 30 seconds or so, which stays roughly in sync with a server, so you can use them as one-time passwords instead of storing a password that's good for a long term. So if the phisher cons you

Re: Banks Test ID Device for Online Security

2005-01-05 Thread Anne Lynn Wheeler
Bill Stewart wrote: Yup. It's the little keychain frob that gives you a string of numbers, updated every 30 seconds or so, which stays roughly in sync with a server, so you can use them as one-time passwords instead of storing a password that's good for a long term. So if the phisher cons you

Re: Academics locked out by tight visa controls

2004-09-20 Thread Anne Lynn Wheeler
fields reaches new peak; 1st time enrollment of foreign students drops http://www.nsf.gov/sbe/srs/infbrief/nsf04326/start.htm -- Anne Lynn Wheelerhttp://www.garlic.com/~lynn/

Re: An attack on paypal

2003-06-12 Thread Anne Lynn Wheeler
. -- Anne Lynn Wheelerhttp://www.garlic.com/~lynn/ Internet trivia 20th anv http://www.garlic.com/~lynn/rfcietff.htm

virus attack on banks (was attack on paypal)

2003-06-10 Thread Anne Lynn Wheeler
At 06:12 PM 6/8/2003 -0600, Anne Lynn Wheeler wrote: at a recent cybersecurity conference, somebody made the statement that (of the current outsider, internet exploits, approximately 1/3rd are buffer overflows, 1/3rd are network traffic containing virus that infects a machine because

Re: Maybe It's Snake Oil All the Way Down

2003-06-06 Thread Anne Lynn Wheeler
. -- Anne Lynn Wheelerhttp://www.garlic.com/~lynn/ Internet trivia 20th anv http://www.garlic.com/~lynn/rfcietff.htm

Re: Maybe It's Snake Oil All the Way Down

2003-06-06 Thread Anne Lynn Wheeler
startup in menlo park (later moved to mountain view and have since been bought by AOL) and people saying that SSL didn't exist ... misc ref from the past http://www.garlic.com/~lynn/aadsm5.htm#asrn2 http://www.garlic.com/~lynn/aadsm5.htm#asrn3 -- Anne Lynn Wheelerhttp://www.garlic.com/~lynn

Re: TCPA not virtualizable during ownership change (Re: Overcoming the potential downside of TCPA)

2002-08-16 Thread lynn . wheeler
I arrived at that decision over four years ago ... TCPA possibly didn't decide on it until two years ago. In the assurance session in the TCPA track at spring 2001 intel developer's conference I claimed my chip was much more KISS, more secure, and could reasonably meet the TCPA requirements at

Re: TCPA not virtualizable during ownership change (Re: Overcoming the potential downside of TCPA)

2002-08-15 Thread lynn . wheeler
I arrived at that decision over four years ago ... TCPA possibly didn't decide on it until two years ago. In the assurance session in the TCPA track at spring 2001 intel developer's conference I claimed my chip was much more KISS, more secure, and could reasonably meet the TCPA requirements at

Re: Challenge to David Wagner on TCPA

2002-08-13 Thread lynn . wheeler
actually it is possible to build chips that generate keys as part of manufactoring power-on/test (while still in the wafer, and the private key never, ever exists outside of the chip) ... and be at effectively the same trust level as any other part of the chip (i.e. hard instruction ROM). using

Re: Challenge to David Wagner on TCPA

2002-08-13 Thread lynn . wheeler
actually it is possible to build chips that generate keys as part of manufactoring power-on/test (while still in the wafer, and the private key never, ever exists outside of the chip) ... and be at effectively the same trust level as any other part of the chip (i.e. hard instruction ROM). using

Re: Challenge to TCPA/Palladium detractors

2002-08-10 Thread lynn . wheeler
small discussion of security proportional to risk: http://www.garlic.com/~lynn/2002h.html#61 security proportional to risk slightly related http://www.garlic.com/~lynn/2001j.html#5 E-commerce security http://www.garlic.com/~lynn/2001j.html#54 Does Strong Security Mean Anything? also

Re: Challenge to TCPA/Palladium detractors

2002-08-10 Thread lynn . wheeler
oops, finger slip that should be http://www.garlic.com/~lynn/2001h.html#61 security proportional to risk aka 2001h.html not 2002h.html [EMAIL PROTECTED] on 8/10/2002 11:25 pm wrote: small discussion of security proportional to risk: http://www.garlic.com/~lynn/2002h.html#61 security

Re: IP: SSL Certificate Monopoly Bears Financial Fruit

2002-07-12 Thread lynn . wheeler
and just to make sure there is a common understanding regarding SSL cert operation ... the browser code 1) checks that the SSL server cert can be validated by ANY public key that is in the browser preloaded list (I haven't verified whether they totally ignore all of the cert part of these

Re: maximize best case, worst case, or average case? (TCPA)

2002-06-30 Thread lynn . wheeler
security modules are also inside the swipe pin-entry boxes that you see at check-out counters. effectively both smartcards and dongles are forms of hardware tokens the issue would be whether a smartcard form factor might be utilized in a copy protection scheme similar to TCPA paradigm

Re: maximize best case, worst case, or average case? (TCPA)

2002-06-30 Thread lynn . wheeler
security modules are also inside the swipe pin-entry boxes that you see at check-out counters. effectively both smartcards and dongles are forms of hardware tokens the issue would be whether a smartcard form factor might be utilized in a copy protection scheme similar to TCPA paradigm

Re: PKI: Only Mostly Dead

2002-06-10 Thread lynn . wheeler
this is in reference to the use of public key certificates to secure ecommerce web sites. Every one of those https connections is secured by an X.509 certificate infrastructure. That's PKI. Opinion is divided on the subject -- Captain Rum, Blackadder, Potato. The use with SSL is what Anne|Lynn Wheeler refer

Re: PKI: Only Mostly Dead

2002-06-09 Thread lynn . wheeler
this is in reference to the use of public key certificates to secure ecommerce web sites. Every one of those https connections is secured by an X.509 certificate infrastructure. That's PKI. Opinion is divided on the subject -- Captain Rum, Blackadder, Potato. The use with SSL is what Anne|Lynn Wheeler refer

Re: Blair accidently sells the roads (was Re: BBC article: Vehicles 'tracked')

2002-02-25 Thread lynn . wheeler
note that it didn't eliminate the economies of scale of network operation there is still massive investment required in things like fiber. some amount of the current pricing could possibly be an overbuilt over-invested infrastructure ... some number of operations going bankrupt ... and then