Re: Saving Opportunistic Encryption

2004-03-17 Thread Eugen Leitl
On Tue, Mar 16, 2004 at 03:29:42PM +0800, Sandy Harris wrote: So, the apparent solution for me seems to be the approach that the SPAM blacklists used - publish information in a subspace of the forward DNS space instead of using the authoritative in-addr.arpa area. Worth discussing at

Re: Saving Opportunistic Encryption

2004-03-17 Thread petard
a couple nitpicks on otherwise interesting points... On Wed, Mar 17, 2004 at 09:02:17AM -0500, sunder wrote: Look at how many folks use PGP - those who really know it and want it, or those who know enough about it and have some easily automated implementation that plugs in to their mail

[wearables] Wearable Computers and Body Privacy take 2

2004-03-17 Thread R. A. Hettinga
--- begin forwarded text Date: Wed, 17 Mar 2004 01:29:53 -0500 (EST) From: Thad E. Starner [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: [wearables] Wearable Computers and Body Privacy take 2 Sender: [EMAIL PROTECTED] Thanks to everyone for their comments so far. Here is a second version

Re: If You Want to Protect A Security Secret, Make Sure It's Public

2004-03-17 Thread John Young
Despite the long-lived argument that public review of crypto assures its reliability, no national infosec agency -- in any country worldwide -- follows that practice for the most secure systems. NSA's support for AES notwithstanding, the agency does not disclose its military and high level

Re: Saving Opportunistic Encryption

2004-03-17 Thread sunder
Eugen Leitl wrote: No, anything requiring publishing DNS records won't fly. OE is *opportunistic*. It doesn't care about what the true identity of the opposite party is. Any shmuck on dynamic IP should be able to use it instantly, with no observable performance degradation, using a simple patch.

Re: Saving Opportunistic Encryption

2004-03-17 Thread Eugen Leitl
On Wed, Mar 17, 2004 at 03:09:54PM +, petard wrote: There's a well-supported extension for that: http://enigmail.mozdev.org/ Actually, plans are in the works to make S/MIME an extension as well, so the two will soon be on equal footing. PGP/GPG has failed to protect the bulf of email for

[p2p-hackers] CFP: Workshop on Privacy in the Electronic Society (fwd from decapita@dti.unimi.it)

2004-03-17 Thread Eugen Leitl
- Forwarded message from Sabrina De Capitani di Vimercati [EMAIL PROTECTED] - From: Sabrina De Capitani di Vimercati [EMAIL PROTECTED] Date: Wed, 17 Mar 2004 21:42:51 +0100 (CET) To: [EMAIL PROTECTED] Subject: [p2p-hackers] CFP: Workshop on Privacy in the Electronic Society Reply-To:

uncomfortable suspicion: french fending off US PKI domination

2004-03-17 Thread Major Variola (ret.)
COMPUTER SECURITY French Move To Fend Off U.S. Domination With some help from Germany, the French are discreetly seeking an alternative to U.S. domination of the field of computer authentication systems and security (Public Key Infrastructure: [...] [ 617 words 5,5USD ]

Re: Saving Opportunistic Encryption

2004-03-17 Thread Anonymous via the Cypherpunks Tonga Remailer
Hi, Sandy Harris wrote: Tarapia Tapioco wrote: A possible implementation looks like this: ... * Linux/KAME's IKE daemon racoon is patched to attempt retrieval of an RSA key from said DNS repository and generate appropriate security policies. Cleaner solution, but more work probably. Why