On Nov 24, 2003, at 8:26 PM, [EMAIL PROTECTED] wrote:
In a message dated 11/24/2003 11:12:38 PM Eastern Standard Time,
[EMAIL PROTECTED] writes:
I expect there may be some good solutions to this issue, but I haven't
yet seen them discussed here or on other fora I run across.
What part of I
In a message dated 11/24/2003 11:12:38 PM Eastern Standard Time,
[EMAIL PROTECTED] writes:
I expect there may be some good solutions to this issue, but I haven't
yet seen them discussed here or on other fora I run across.
Like what?
Regards, Matt-
At 2:30 PM -0800 11/24/03, Major Variola (ret) wrote:
At 01:04 PM 11/24/03 -0500, Trei, Peter wrote:
Thats not how it works. The idea is that you make your choices on
the machine, and when you lock them in, two things happen: They
are electronically recorded in the device for the normal count, and
At 05:45 PM 11/20/2003 -0800, Bill Frantz wrote:
At 4:40 PM -0800 11/20/03, Ralf-P. Weinmann wrote:
... There should be a means to cache credentials after an initial
trust relationship between communicating parties has been established.
Cache entries would be a way for someone who obtains the
At 04:20 PM 11/21/2003 -0800, Hallam-Baker, Phillip wrote:
We need to consider the technical workings of the do-not-spam list and the
requirements that we would like the FTC to meet.
.. [reasonable goals] ... [hashed-form lists instead of plaintext]...
5) Allow domain name owners to list their
You might check out David Chaum's latest solution at
http://www.vreceipt.com/, there are more details in the whitepaper:
http://www.vreceipt.com/article.pdf
That is irrelevant. Whatever the solution is it must be understandable and
verifiable by the Standard high school dropout. Also, the
UNITED STATES OF AMERICA, Plaintiff-Appellee, v. ROBERT JUNIOR WARDRICK,
Defendant-Appellant.
No. 02-4494
UNITED STATES COURT OF APPEALS FOR THE FOURTH CIRCUIT
September 24, 2003, Argued
November 20, 2003, Decided
OUTCOME: Defendant's convictions and sentence were affirmed.
As Judge Widener
Especially for domains, it's important to do some validation,
though in the absence of widely-deployed DNSSEC, it's hard to
do automatically.
DNSSEC is not happening, blame Randy Bush and the IESG for
refusing the working group consensus and imposing their own
idea that cannot be deployed.
At 8:04 PM -0800 11/24/03, Tim May wrote:
I expect there may be some good solutions to this issue, but I haven't
yet seen them discussed here or on other fora I run across. And since
encouraging the democrats has never been a priority for me, I haven't
spent much time worrying about how to improve
On Nov 24, 2003, at 3:52 PM, Bill Frantz wrote:
At 2:30 PM -0800 11/24/03, Major Variola (ret) wrote:
At 01:04 PM 11/24/03 -0500, Trei, Peter wrote:
Thats not how it works. The idea is that you make your choices on
the machine, and when you lock them in, two things happen: They
are electronically
Hello
I was trying to find some old references I used to have concerning an idea men tioned
in sci.crypt way back.
It was Phil Zimmermann I think who mentioned something about a possibly new idea for
a new public key scheme. He called it The cryptographic uses of polygonal sequences
and is
We have recognized that, HN6[]under appropriate exigent circumstances,
strict compliance with the knock and announce requirement may be excused.
United States v. Grogins, 163 F.3d 795, 797 (4th Cir. 1998) (holding
no-knock entry justified where officers had reasonable suspicion that
entering
Um, last I checked, phone cameras have really shitty resolution, usually
less than 320x200. Even so, you'd need MUCH higher resolution, say
3-5Mpixels to be able to read text on a printout in a picture.
Add focus and aiming issues, and this just won't work unless you carry a
good camera into the
On Nov 25, 2003, at 9:56 AM, Sunder wrote:
Um, last I checked, phone cameras have really shitty resolution,
usually
less than 320x200. Even so, you'd need MUCH higher resolution, say
3-5Mpixels to be able to read text on a printout in a picture.
Add focus and aiming issues, and this just
Tim May [mailto:[EMAIL PROTECTED] wrote:
On Nov 25, 2003, at 9:56 AM, Sunder wrote:
Um, last I checked, phone cameras have really shitty resolution,
usually
less than 320x200. Even so, you'd need MUCH higher resolution, say
3-5Mpixels to be able to read text on a printout in a picture.
At 19:01 -0500 on 11/15/03, R. A. Hettinga wrote:
--- begin forwarded text
Status: U
Date: Sat, 15 Nov 2003 13:03:33 +0100
From: Ralf-P. Weinmann [EMAIL PROTECTED]
To: Nicko van Someren [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED], R. A. Hettinga [EMAIL PROTECTED]
Subject: Re: [Mac_crypto] MacOS X
In a message dated 11/25/2003 1:23:08 PM Eastern Standard Time,
[EMAIL PROTECTED] writes:
I know that there have been cases which determined that its illegal to use
an indiscriminate weapon (e.g., a shotgun tied to a door) to deter such
entries, but what about a discriminate, automated,
Bedazzled Log-in Method Whitepaper
Author: George Hara
(http://www.filematrix.xnet.ro/ideas/whitepapers/login.htm)
Introduction
Using strings of characters as passwords has always been a security issue
because they are hard to remember and can be stolen by key-loggers or
screen-text
18 matches
Mail list logo