Search Mailing List Archives

Limit search to: Subject & Body Subject Author
Sort by: Reverse Sort
Limit to: All This Week Last Week This Month Last Month
Select Date Range     through    

[liberationtech] On the technical and legal aspects of security, transparency, and audibility of the NSA surveillance data.

Jonathan Wilkes jancsika at
Mon Jul 1 18:07:18 PDT 2013

On 07/01/2013 07:06 PM, Landon Hurley wrote:
> Hash: SHA512
>   (And the quote I cannot find ATM from the cryptography guy back in the 1800s who
>> said you should be able to describe how a cryptosystem works without
>> breaking it probably applies here.)

Yeah, that's the one!

The Wikipedia entry also mentions Shannon's Maxim.  Maybe in
the future I should just make a rule of starting at Shannon, and
I'll have a good probability of working forwards or backwards to
the thing I was trying to find. :)


> - --
> Unethical - adj. A word describing anything I don't like that makes me feel bad regardless of whether I have actually considered the thing in question.
> Version: APG v1.0.8
> Y29tPgAKCRA3qYf9H1SVrCuRD/9uuq09znSX1lk9nNTRrg5OyLzTl9xFhP6Mejrf
> rrV8+x+RtCv9Ti8vtCUpxoR1l6pEY6XANBGUDd/yPm8fzfZomy6/+FoYCp48DpWp
> oLmlL6R+0CzdTMSl7+Dk0XSCW7GQxhDIFk3BcQDayvZ6FcsDjsL5YPSfqL5hoIo5
> RCQrLMa9bcFyGS8yFCMq17uCzYA/D11i3N+45uTLDU300err9pLi5QWWwPYtFiCf
> iEKPXRpKR90C3iDZq7jstaumXFBTtiouoQv+8jYrAZay28TtRhnku6/nSeBgRWXi
> TqvcFOJQdAfGDX2urc/Gx+6k+Dq4S/ExGREHegC8bKnndI5PaIaziWWgaEpyA9zf
> UqLXEQzm+ocjY4dQW5tY4jDt8Y6PaLT1EW2DGQHJOpXgURJeMnMiurbW8+yF8qNZ
> Je+6Tgpz0JX891e/bqNgAAE3UTRvYs+bjPZGVSU8ucrub/KtRW4OgPDI97ezdkL+
> yydlog/b5iK613V6X3L0XRSufh8uyDxURgweE0A8/FkMAHdy/N7GPn2DDR38NuAS
> LKi/OAUSxyUWwfpiX3vOmgvAx95pMKdPkw3bnDTHstb7mllsxl3Asnrk0MB0nDkS
> mxuQi0ploC9phTwBc20a0vNZeUHhzBIHPH0M7fi0OQG02K+cw4pctEhihHRdnkYl
> xHOaJw==
> =nvNS
> --
> Too many emails? Unsubscribe, change to digest, or change password by emailing moderator at companys at or changing your settings at

More information about the liberationtech mailing list