Re: Re: Can Skype be wiretapped by the authorities? (fwd from em@em.no-ip.com)

2004-05-11 Thread Bill Stewart
Like it matters. Do you really think that the government would really allow Intel and AMD to sell CPUs that didn't have tiny transmitters in them? Your CPU is actually transmitting every instruction it executes to the satellites. That's why you keep your CPU under your tin-foil hat, isn't

Re: SASSER Worm Dude

2004-05-11 Thread Dave Howe
Tyler Durden wrote: HANOVER, Germany -- German police have arrested an 18-year-old man suspected of creating the Sasser computer worm, believed to be one of the Internet's most costly outbreaks of sabotage. Note the language...an 18 year old MAN and sabotage... So a HS kid, living with his

[linux-elitists] Two on RFID from Politech: Hack the tech, Gilmore's dystopia (fwd from kmself@ix.netcom.com)

2004-05-11 Thread Eugen Leitl
- Forwarded message from Karsten M. Self [EMAIL PROTECTED] - From: Karsten M. Self [EMAIL PROTECTED] Date: Mon, 10 May 2004 01:23:07 -0700 To: Linux Elitists [EMAIL PROTECTED] Subject: [linux-elitists] Two on RFID from Politech: Hack the tech, Gilmore's dystopia User-Agent:

Re: Can Skype be wiretapped by the authorities? (fwd from em@em.no-ip.com)

2004-05-11 Thread Justin
John Young (2004-05-11 00:09Z) wrote: Brian Dunbar wrote: Like it matters. Do you really think that the government would really allow Intel and AMD to sell CPUs that didn't have tiny transmitters in them? Your CPU is actually transmitting every instruction it executes to the

Re: who goes 1st problem

2004-05-11 Thread Jason Holt
[Adam and I are taking this discussion off-list to spare your inboxes, but this message seemed particularly relevant. Perhaps we'll come back later if we come up with anything we think will be of general interest.] -J On Tue, 11 May 2004, Adam Back

Re: Brands' private credentials

2004-05-11 Thread Ben Laurie
Adam Back wrote: On Mon, May 10, 2004 at 02:42:04AM +, Jason Holt wrote: Another approach to hiding membership is one of the techniques proposed for non-transferable signatures, where you use construct: RSA-sig_A(x),RSA-sig_B(y) and verification is x xor y = hash(message). Where the sender is

Re: more hiddencredentials comments (Re: Brands' private credentials)

2004-05-11 Thread Adam Back
Gap may be I'm misunderstanding something about the HC approach. We have: P = (P1 or P2) is encoded HC_E(R,p) = {HC_E(R,P1),HC_E(R,P2)} so one problem is marking, the server sends you different R values: {HC_E(R,P1),HC_E(R',P2)} so you described one way to fix that by using