From: Eli Brandt <ebrandt@jarthur.cs.hmc.edu>
To: cypherpunks list <cypherpunks@toad.com>
Message Hash: 7a888b9bd3d43ba61b35651fc798c45dbe9ba2e3e736758ab91fe1a8f028fc79
Message ID: <9403070903.AA24454@toad.com>
Reply To: <Pine.3.89.9403070307.D1315-0100000@delbruck.pharm.sunysb.edu>
UTC Datetime: 1994-03-07 09:03:20 UTC
Raw Date: Mon, 7 Mar 94 01:03:20 PST
From: Eli Brandt <ebrandt@jarthur.cs.hmc.edu>
Date: Mon, 7 Mar 94 01:03:20 PST
To: cypherpunks list <cypherpunks@toad.com>
Subject: Re: Standard for SteGAnography
In-Reply-To: <Pine.3.89.9403070307.D1315-0100000@delbruck.pharm.sunysb.edu>
Message-ID: <9403070903.AA24454@toad.com>
MIME-Version: 1.0
Content-Type: text/plain
> My original response was concerning an algorithm "good enough to withstand
> an opponent who has full documentation of your algorithms and methods lots
> of funds, and everything except your keys."
That's what they have; what can they *do*? As I've been trying to
get across, that is not a full specification of capabilities.
Enough.
Eli ebrandt@hmc.edu
Return to March 1994
Return to “wcs@anchor.ho.att.com (bill.stewart@pleasantonca.ncr.com +1-510-484-6204)”