Red James Cash
Banned
- Aug 20, 2009
- 12,824
- 7,899
- Detector(s) used
- Garret Master hunter Cx Plus
- Primary Interest:
- Other
Privacy? You Never Had It. Some Things You Should Know.
We have things like Man in the Middle:
en.wikipedia.org...
The man-in-the-middle attack (often abbreviated MITM, MitM, MIM, MiM, MITMA, also known as a bucket brigade attack, or sometimes Janus attack[citation needed]) in cryptography and computer security is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all messages going between the two victims and inject new ones, which is straightforward in many circumstances (for example, an attacker within reception range of an unencrypted Wi-Fi wireless access point, can insert himself as a man-in-the-middle)
We have the Clipper Chip:
epic.org...
The Clipper Chip is a cryptographic device purportedly intended to protect private communications while at the same time permitting government agents to obtain the "keys" upon presentation of what has been vaguely characterized as "legal authorization." The "keys" are held by two government "escrow agents" and would enable the government to access the encrypted private communication. While Clipper would be used to encrypt voice transmissions, a similar chip known as Capstone would be used to encrypt data.
The underlying cryptographic algorithm, known as Skipjack, was developed by the National Security Agency (NSA), a super-secret military intelligence agency responsible for intercepting foreign government communications and breaking the codes that protect such transmissions. In 1987, Congress passed the Computer Security Act, a law intended to limit NSA's role in developing standards for the civilian communications system. In spite of that legislation, the agency has played a leading role in the Clipper initiative and other civilian security proposals, such as the Digital Signature Standard. NSA has classified the Skipjack algorithm on national security grounds, thus precluding independent evaluation of the system's strength.
The Impact of a Secret Cryptographic Standard on Encryption, Privacy, Law Enforcement and Technology.
epic.org...
On Friday, the 16th of April, a sweeping new proposal for
both the promotion and control of cryptography was made public on the
front page of the New York Times and in press releases from the White
House and other organizations.
This proposal was to adopt a new cryptographic system as a
federal standard, but at the same time to keep the system's
functioning secret. The standard would call for the use of a tamper
resistant chip, called Clipper, and embody a `back door' that
will allow the government to decrypt the traffic for law enforcement
and national security purposes.
Letter signed by cryptography, security and networking experts, January 1994. The letter was followed with a Electronic Petition to oppose Clipper. Eventually, over 50,000 people responded to the petition request.
epic.org...
Visa Seeks the Unwired's Interest in DigiBucks
To Visa executives, there are only two kinds of people in the world: the "banked" and the "unbanked" - those with money stashed away in financial institutions and those sitting on mattresses stuffed with bills. To convert the latter, many of whom live in developing countries, Visa is waging a "battle against cash" and employing an unlikely weapon: the smartcard.
In fact, if Visa gets its way, South America, Russia, and Asia will get a taste of smartcard technology and digital cash even before the United States does. In a conference Thursday, a team of six regional Visa vice presidents unveiled a bare-bones smartcard system called COPAC (chip offline pre-authorized card), designed specifically for emerging economies where fluctuating currencies, unstable infrastructures, and bank insolvency have made the Western way of money - credit cards and ATMs - an unrealistic option.
wired.com...
What is Web 2.0?
How Web 2.0 Is Defining Society
Have you heard of Internet 2?
What is Web 2.0? It is a question with many different answers. There is no clear definition of web 2.0, and like many concepts, it has taken on a life of its own. But one thing is clear: Web 2.0 marks a fundamental change in how we use the Internet.
Web 2.0 is the move toward a more social, collaborative, interactive and responsive web. It is a change in the philosophy of web companies and web developers, but more than that, Web 2.0 is a change in the philosophy of society as a whole.
Web 2.0 marks a change in us as a society as well as the Internet as a technology. In the early days of the web, we used it as a tool. Today, we aren't just using the Internet as a tool -- we are becoming a part of it.
What is Web 2.0? It is the process of putting us into the web.
Web 2.0 is a Social Web
The idea of human society merging with a network of computers might sound like the bad plot out of a pulp science fiction novel, but it is a fair description of what is happening in our society today.
Not only are we increasing our usage of the Internet -- from how much time we spend on it at home to how we are increasingly carrying around a version of it in our pocket -- but we are changing the way we interact with it
webtrends.about.com...
We have things like Man in the Middle:
en.wikipedia.org...
The man-in-the-middle attack (often abbreviated MITM, MitM, MIM, MiM, MITMA, also known as a bucket brigade attack, or sometimes Janus attack[citation needed]) in cryptography and computer security is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all messages going between the two victims and inject new ones, which is straightforward in many circumstances (for example, an attacker within reception range of an unencrypted Wi-Fi wireless access point, can insert himself as a man-in-the-middle)
We have the Clipper Chip:
epic.org...
The Clipper Chip is a cryptographic device purportedly intended to protect private communications while at the same time permitting government agents to obtain the "keys" upon presentation of what has been vaguely characterized as "legal authorization." The "keys" are held by two government "escrow agents" and would enable the government to access the encrypted private communication. While Clipper would be used to encrypt voice transmissions, a similar chip known as Capstone would be used to encrypt data.
The underlying cryptographic algorithm, known as Skipjack, was developed by the National Security Agency (NSA), a super-secret military intelligence agency responsible for intercepting foreign government communications and breaking the codes that protect such transmissions. In 1987, Congress passed the Computer Security Act, a law intended to limit NSA's role in developing standards for the civilian communications system. In spite of that legislation, the agency has played a leading role in the Clipper initiative and other civilian security proposals, such as the Digital Signature Standard. NSA has classified the Skipjack algorithm on national security grounds, thus precluding independent evaluation of the system's strength.
The Impact of a Secret Cryptographic Standard on Encryption, Privacy, Law Enforcement and Technology.
epic.org...
On Friday, the 16th of April, a sweeping new proposal for
both the promotion and control of cryptography was made public on the
front page of the New York Times and in press releases from the White
House and other organizations.
This proposal was to adopt a new cryptographic system as a
federal standard, but at the same time to keep the system's
functioning secret. The standard would call for the use of a tamper
resistant chip, called Clipper, and embody a `back door' that
will allow the government to decrypt the traffic for law enforcement
and national security purposes.
Letter signed by cryptography, security and networking experts, January 1994. The letter was followed with a Electronic Petition to oppose Clipper. Eventually, over 50,000 people responded to the petition request.
epic.org...
Visa Seeks the Unwired's Interest in DigiBucks
To Visa executives, there are only two kinds of people in the world: the "banked" and the "unbanked" - those with money stashed away in financial institutions and those sitting on mattresses stuffed with bills. To convert the latter, many of whom live in developing countries, Visa is waging a "battle against cash" and employing an unlikely weapon: the smartcard.
In fact, if Visa gets its way, South America, Russia, and Asia will get a taste of smartcard technology and digital cash even before the United States does. In a conference Thursday, a team of six regional Visa vice presidents unveiled a bare-bones smartcard system called COPAC (chip offline pre-authorized card), designed specifically for emerging economies where fluctuating currencies, unstable infrastructures, and bank insolvency have made the Western way of money - credit cards and ATMs - an unrealistic option.
wired.com...
What is Web 2.0?
How Web 2.0 Is Defining Society
Have you heard of Internet 2?
What is Web 2.0? It is a question with many different answers. There is no clear definition of web 2.0, and like many concepts, it has taken on a life of its own. But one thing is clear: Web 2.0 marks a fundamental change in how we use the Internet.
Web 2.0 is the move toward a more social, collaborative, interactive and responsive web. It is a change in the philosophy of web companies and web developers, but more than that, Web 2.0 is a change in the philosophy of society as a whole.
Web 2.0 marks a change in us as a society as well as the Internet as a technology. In the early days of the web, we used it as a tool. Today, we aren't just using the Internet as a tool -- we are becoming a part of it.
What is Web 2.0? It is the process of putting us into the web.
Web 2.0 is a Social Web
The idea of human society merging with a network of computers might sound like the bad plot out of a pulp science fiction novel, but it is a fair description of what is happening in our society today.
Not only are we increasing our usage of the Internet -- from how much time we spend on it at home to how we are increasingly carrying around a version of it in our pocket -- but we are changing the way we interact with it
webtrends.about.com...