[16377] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Financial identity is *dangerous*? (was re: Fake companies, real money)

daemon@ATHENA.MIT.EDU (James A. Donald)
Thu Oct 28 17:37:20 2004

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: "James A. Donald" <jamesd@echeque.com>
To: cryptography@metzdowd.com
Date: Thu, 28 Oct 2004 09:29:21 -0700
In-reply-to: <p061104fbbda313067d6e@[66.149.49.5]>

    --
R.A. Hettinga wrote:
> [The mobile phone is] certainly getting to be like Chaum's
> ideal crypto device. You own it, it has its own I/O, and it
> never leaves your sight.

Is there a phone that is programmable enough to store secrets 
on and sign and decrypt stuff?

The ideal crypto device would be programmed by burning new 
proms, thus enabling easy reprogramming, while making it 
resistant to trojans and viruses. 

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     Fkc1LRTOk91ROlSR8FZ74DmqbH7hISIn+MSojROa
     4nrRtvxhCmqe2NdvICprDQBO78fHoQXljK45ROM2W



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post