From: Mike Tighe <tighe@spectrum.titan.com>
To: jya@pipeline.com (John Young)
Message Hash: 2c4140551aade2e049378b0e584d597bb735a2e3175a2f9ec57d6f6a13d806d9
Message ID: <199602162252.QAA27785@softserv.tcst.com>
Reply To: <199602151707.MAA24559@pipe2.nyc.pipeline.com>
UTC Datetime: 1996-02-17 01:22:45 UTC
Raw Date: Sat, 17 Feb 1996 09:22:45 +0800
From: Mike Tighe <tighe@spectrum.titan.com>
Date: Sat, 17 Feb 1996 09:22:45 +0800
To: jya@pipeline.com (John Young)
Subject: Re: DES_ono
In-Reply-To: <199602151707.MAA24559@pipe2.nyc.pipeline.com>
Message-ID: <199602162252.QAA27785@softserv.tcst.com>
MIME-Version: 1.0
Content-Type: text/plain
John Young writes:
> Citing the crypto-expert BSA study noted here by Matt
> Blaze, Computerworld of 2-12-96:
> "Standard Encryption Vulnerable To Attack. Banking's most
> trusted technique for funds transfer questioned."
So the banker's finally figured out what the NSA told us 14 years ago?
Great.
Return to February 1996
Return to “Mike Tighe <tighe@spectrum.titan.com>”