From: Andy Brown <asb@nexor.co.uk>
To: cypherpunks@toad.com
Message Hash: eabf905bf6024209fcc7298796422ad9be66c518672a2b3cdc5ecb8285d2879d
Message ID: <Pine.SOL.3.91.950817172311.26996D-100000@eagle.nexor.co.uk>
Reply To: <199508171711.MAA02559@spectrum.bradley.edu>
UTC Datetime: 1995-08-17 16:29:37 UTC
Raw Date: Thu, 17 Aug 95 09:29:37 PDT
From: Andy Brown <asb@nexor.co.uk>
Date: Thu, 17 Aug 95 09:29:37 PDT
To: cypherpunks@toad.com
Subject: Re: Netsacpe's Offical Response
In-Reply-To: <199508171711.MAA02559@spectrum.bradley.edu>
Message-ID: <Pine.SOL.3.91.950817172311.26996D-100000@eagle.nexor.co.uk>
MIME-Version: 1.0
Content-Type: text/plain
On Thu, 17 Aug 1995, Glenn Powers forwarded Netscape's official response:
> So in conclusion, we think RC4-40 is strong enough to protect consumer-level
> credit-card transactions -- since the cost of breaking the message is
> sufficiently high to make it not worth the computer time required to do so
That was a rather silly thing to say.
- Andy
Return to August 1995
Return to “Jim Gillogly <jim@acm.org>”