The Key Vanishes: Scientist Outlines Unbreakable Code
Sunder
sunder at sunder.net
Thu Feb 22 15:29:47 PST 2001
Jim Choate wrote:
>
> Really?
>
> So let me get this straight. You're so worried about taps and
> interceptions that you are willing to potentially spend thousands of
> dollars on the hardware to detect the sorts of events under question (ie
> astronomical RNG's).
Actually I am not.
> So normal old terrestrial sources aren't good enogh because they might
> be tampered with.
If that is your threat model. Again, go back and read this guy's paper.
The random source is available to anyone in his scheme.
> But you're ok with going out and buying a webcam from who knows where?
If that's my threat model, yes. If it's not, I may be willing to build my
own set of web cams, etc.
--
----------------------Kaos-Keraunos-Kybernetos---------------------------
+ ^ + :Surveillance cameras|Passwords are like underwear. You don't /|\
\|/ :aren't security. A |share them, you don't hang them on your/\|/\
<--*-->:camera won't stop a |monitor, or under your keyboard, you \/|\/
/|\ :masked killer, but |don't email them, or put them on a web \|/
+ v + :will violate privacy|site, and you must change them very often.
--------_sunder_ at _sunder_._net_------- http://www.sunder.net ------------
More information about the cypherpunks-legacy
mailing list