Re: I'll show you mine if you show me, er, mine

2005-03-03 Thread Jerrold Leichter
| >Briefly, it works like this: point A transmits an encrypted message to point | >B. Point B can decrypt this, if it knows the password. The decrypted text is | >then sent back to point A, which can verify the decryption, and confirm that | >point B really does know point A's password. Point A the

Re: I'll show you mine if you show me, er, mine

2005-03-03 Thread Dan Kaminsky
>The description has virtually nothing to do with the actual algorithm >proposed. Follow the link in the article - http://www.stealth-attacks.info/ - >for an actual - if informal - description. > > There is no actual description publically available (there are three completely different proto

Re: I'll show you mine if you show me, er, mine

2005-03-03 Thread J.A. Terranson
On Thu, 24 Feb 2005, Peter Gutmann wrote: > (Either this is a really bad idea or the details have been mangled by the > Register). No, it's just a really bad idea. A small group of us looked at this a few weeks ago when it was announced, and while none of us are professional cryptographers, we

Re: How to Stop Junk E-Mail: Charge for the Stamp

2005-03-03 Thread Justin
On 2005-03-03T11:52:59+, ken wrote: > > >Chat is already higher volume (I read somewhere) in > >raw quantity of messages sent than email. > > I suspect you don't get much traffic. The beauty of a > non-real-time store-and-forward system like smtp (or SMS, or > oldstyle conferencing systems

Re: How to Stop Junk E-Mail: Charge for the Stamp

2005-03-03 Thread ken
My view - as controversial as ever - is that the problem is unfixable, and mail will eventually fade away. That which will take its place is p2p / IM / chat / SMS based. Which are easier to spam and less secure than smtp. SMTP is p2p by definition, though you can use servers if you want. SMS *IS*