The Key Vanishes: Scientist Outlines Unbreakable Code

Sunder sunder at sunder.net
Thu Feb 22 15:29:47 PST 2001


Jim Choate wrote:
> 
> Really?
> 
> So let me get this straight. You're so worried about taps and
> interceptions that you are willing to potentially spend thousands of
> dollars on the hardware to detect the sorts of events under question (ie
> astronomical RNG's). 

Actually I am not.

> So normal old terrestrial sources aren't good enogh because they might 
> be tampered with.

If that is your threat model.  Again, go back and read this guy's paper.
The random source is available to anyone in his scheme.

> But you're ok with going out and buying a webcam from who knows where?

If that's my threat model, yes.  If it's not, I may be willing to build my
own set of web cams, etc.

-- 
----------------------Kaos-Keraunos-Kybernetos---------------------------
 + ^ + :Surveillance cameras|Passwords are like underwear. You don't /|\
  \|/  :aren't security.  A |share them, you don't hang them on your/\|/\
<--*-->:camera won't stop a |monitor, or under your keyboard, you   \/|\/
  /|\  :masked killer, but  |don't email them, or put them on a web  \|/
 + v + :will violate privacy|site, and you must change them very often.
--------_sunder_ at _sunder_._net_------- http://www.sunder.net ------------





More information about the cypherpunks-legacy mailing list