[128082] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Mifare

daemon@ATHENA.MIT.EDU (Thor Lancelot Simon)
Mon Jul 14 13:29:41 2008

Date: Mon, 14 Jul 2008 10:42:23 -0400
From: Thor Lancelot Simon <tls@rek.tjls.com>
To: "James A. Donald" <jamesd@echeque.com>
Cc: cryptography@metzdowd.com
Reply-To: tls@rek.tjls.com
In-Reply-To: <48798779.6030804@echeque.com>

On Sun, Jul 13, 2008 at 02:41:29PM +1000, James A. Donald wrote:
> 
> Now everyone is going to say it should have been put out for review, and 
> of course it should have been, and had they done so they would have 
> avoided these particular mistakes, but DNSSEC and WPA was reviewed to 
> hell and back, and the result was still no damned good.

Really?  From a cryptographic -- not a political -- point of view, what
exactly is wrong with DNSSEC or WPA?

WPA certainly seems to be quite widely deployed.

-- 
Thor Lancelot Simon	                                   tls@rek.tjls.com
 "My guess is that the minimal training typically provided would only
 have given the party in question multiple new and elaborate ways to do
 something incomprehensibly stupid and dangerous."	-Rich Goldstone

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post