Hi all,
I don't understand very much technical details of this topic,
neither I want to troll, but my curiousity is if OpenBSD devs
follow Bruce Schneier arguments and whole topic and if they
have done, do or will do some re-evaluation of crypto in OpenBSD
to minimalize being vulnerable to
On Wed, Sep 11, 2013 at 03:26:07AM -0400, Jiri B wrote:
I don't understand very much technical details of this topic,
neither I want to troll, but my curiousity is if OpenBSD devs
follow Bruce Schneier arguments and whole topic and if they
have done, do or will do some re-evaluation of
2013/9/11 Jiri B ji...@devio.us:
neither I want to troll, but my curiousity is if OpenBSD devs
follow Bruce Schneier arguments and whole topic and if they
have done, do or will do some re-evaluation of crypto in OpenBSD
to minimalize being vulnerable to describe attacks.
The monkeys will
On Wed, Sep 11, 2013 at 09:58:12AM +0200, Peter N. M. Hansteen wrote:
Re-evaluation and auditing is very much a part of the general OpenBSD
development process (see eg http://www.openbsd.org/goals.html and
http://www.openbsd.org/security.html, with links therein) already,
but I wouldn't be
2013/9/11 Marc Espie es...@nerim.net:
Second, low hanging fruit.
There's so much crappy software and hardware out there that you have to be
REALLY paranoid to think the NSA would target us. I mean, come on, there
You think openssh isn't a valuable target?
You think openbsd isn't used in
On Wed, Sep 11, 2013 at 10:49:46AM +0200, Martin Schröder wrote:
2013/9/11 Marc Espie es...@nerim.net:
Second, low hanging fruit.
There's so much crappy software and hardware out there that you have to be
REALLY paranoid to think the NSA would target us. I mean, come on, there
You
Second, low hanging fruit.
Contrary to what some hysterical reports may claim, and some violations
of rules aside, NSA is mostly after bad guys, some of which know quite
well what they are doing. These bad guys will not necessarily be kind
enough to present NSA with unpatched Windows desktops.
As I have mentioned before: what good is perfect security in an OS if you
have no control over the hardware? Put some back doors into the CPU or the
networking hardware and OpenSSH will fall. There is really no point in
trying to outwit three letter agencies with our laptops.
Both good and
Gesendet: Mittwoch, 11. September 2013 um 11:42 Uhr
Von: Rudolf Leitgeb rudolf.leit...@gmx.at
An: es...@nerim.net
Cc: misc@openbsd.org
Betreff: Re: OpenBSD crypto and NSA/Bruce Schneier
Second, low hanging fruit.
Contrary to what some hysterical reports may claim, and some violations
On Wed, Sep 11, 2013 at 10:49:46AM +0200, Martin Schr?der wrote:
2013/9/11 Marc Espie es...@nerim.net:
Second, low hanging fruit.
There's so much crappy software and hardware out there that you have to be
REALLY paranoid to think the NSA would target us. I mean, come on, there
You
After all, we could change to hardware that does not have theses things.
I'd like to hear more about this.
Zoran
On Wed, Sep 11, 2013 at 02:00:38PM +, John Long wrote:
You want security, run OpenBSD on a Chinese router or SBC or fab your own
chips and build your own hardware. And stay the hell off the net.
Sorry for posting the following link, but this reminds me of an
incredibly bad movie:
On Wed, Sep 11, 2013 at 3:58 AM, Peter N. M. Hansteen pe...@bsdly.netwrote:
on that front. On a related note, I quite enjoyed reading FreeBSD
developer Colin Percival's take on the various revelations and claims:
http://www.daemonology.net/blog/2013-09-10-I-might-be-a-spook.html
Isn't that
to cooperate
build your own devices, and software with strong crypto and no security
problems and maybe u will have a good channel to check out your facebook or
chat with grandma
Date: Wed, 11 Sep 2013 14:00:38 +
From: codeb...@inbox.lv
To: misc@openbsd.org
Subject: Re: OpenBSD crypto and NSA
On Wed, Sep 11, 2013 at 10:00 AM, John Long codeb...@inbox.lv wrote:
You think they need to target protocols? There are much easier ways of
doing
things. Strong crypto works if you do all the management stuff. Most people
have no idea what's involved with that. Like Espie says there's plenty
On 09/11/2013 05:42 AM, Rudolf Leitgeb wrote:
Second, low hanging fruit.
Contrary to what some hysterical reports may claim, and some violations
of rules aside, NSA is mostly after bad guys, some of which know quite
well what they are doing. These bad guys will not necessarily be kind
enough
On Wed, Sep 11, 2013 at 2:56 PM, Geoff Steckel g...@oat.com wrote:
Disk drives are (presumably) trivial to take over. They have firmware
and mechanisms to
use alternate physical blocks for a given logical block.
You're absolutely correct, and this is not theoretical: (page navigation is
in
17 matches
Mail list logo