Adam Back wrote:
Here's a forward of parts of an email I sent to Richard with comments on
his and Ben's paper (sent me a pre-print off-list a couple of weeks ago):
One obvious comment is that the calculations do not take account of
the CAMRAM approach of charging for introductions only. You mentio
> It seems we now have hard figures to support the notion that
> proof-of-work cannot be a complete solution in itself. We will be making
> that clearer in a revision of the paper (and fixing some errors).
It seems that efforts to increase cost of e-mail by some heavy cycle burning
fail on the a
You can pick a few of them by looking in the eye. They
are usually very sharp people.
Sarath.
> "Secret Service people are notoriously known for
> being snappy dressers,"
> said Capt. Steve Luckey, security chairman for the
> Air Line Pilots
> Association.
__
Anybody know of apps that allow someone to hack somebody else's Palm?
Specifically, say you are beaming or receiving a beam from someone else's
Palm, but you'd like to know much more than what they had planned on beaming
you. So you actually beam them an app that takes their phonebook and
calend
Information, speculation or leads on the Iranian cryptosystem
allegedly cracked or black-jobbed by the US are welcomed for
publication on Cryptome.org.
Reported today in the NY Times and elsewhere. The Times
claims it was asked by the USG to withhold information about
the crack (allegedly revea