SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Politics : Formerly About Advanced Micro Devices -- Ignore unavailable to you. Want to Upgrade?


To: Paul Engel who wrote (47209)1/25/1999 3:23:00 AM
From: Scumbria  Read Replies (2) | Respond to of 1570557
 
Paul,

"Deep Crack and Distributed.Net's network of nearly 100,000 PCs on the Internet won DES Challenge III in 22 hours and 15 minutes."

AND YOU ARE TELLING THE WORLD THAT THOSE 56 BIT- ENCRYPTED MESAGES are SECURE?


Let's see- 22 hours of time on a network of 100,000 PCs, to decrypt some guys credit card number who probably has a limit of about $5000 on his account. Is that what you call cost effective?

If you want someone else's credit card number that bad, get in line at the department store and look over their shoulder.

Hardware data security is unnecessary for the vast majority of computer users. The Clipper II is for the benefit of Bill Gate's wallet, not for the typical consumer.

Scumbria



To: Paul Engel who wrote (47209)1/25/1999 2:33:00 PM
From: Petz  Respond to of 1570557
 
Paul, re:<The CPU ID number is not necessary for secure transmissions>

By ANY definition of secure, the above statement is true, so your statement,
"If you think there is a singular definition of secure, then you are totally incompetent when it comes to discussions of security
... this statment is irrelevant. I never said there was one standard of secure.

Then you accuse me of claiming that 56 bit encryption was "secure." I never said that either. Let me make myself clear,

the CPU ID number is neither a necessary nor a sufficient condition for providing 128 bit encryption, or any particular definition of secure trasmission.

As to your personal attacks, let it be said that I am "one of those people who make their living in the encryption business." Do you think GPS satellites transmit their telemetry and receive their commands in the clear? Who are your contacts at the NSA? Do you think a browser is "trusted software?" Which pins on a Pentium III processor are "red," and which are "black?"

Petz