From: Eric Blossom <eb@comsec.com>
To: cypherpunks@cyberpass.net
Message Hash: 3bde924d07fca9b334fce04d50c3a892f0c672d226814890f78b898993f3294e
Message ID: <199801262255.OAA08550@comsec.com>
Reply To: N/A
UTC Datetime: 1998-01-26 23:36:21 UTC
Raw Date: Tue, 27 Jan 1998 07:36:21 +0800
From: Eric Blossom <eb@comsec.com>
Date: Tue, 27 Jan 1998 07:36:21 +0800
To: cypherpunks@cyberpass.net
Subject: "Privacy on the Line"
Message-ID: <199801262255.OAA08550@comsec.com>
MIME-Version: 1.0
Content-Type: text/plain
I'm about half way through Diffie and Landau's new book,
Privacy on the Line: The Politics of Wiretapping and Encryption
and have found it quite interesting and entertaining.
Contents
1. Introduction
2. Cryptography
3. Cryptography and Public Policy
4. National Security
5. Law Enforcement
6. Privacy: Protections and Threats
7. Wiretapping
8. Communications: The Current Scene
9: Cryptography: The Current Scene
10: Conclusion
It's 342 pages including a great section of notes.
Computer Literacy has it for $22.50. ISBN 0-262-04167-7
mail order: 408-435-0744
ObWoMD: "8. (p. 82) Distinguishing nuclear explosions from other
events, such as large lightning bolts or explosions of meteors in the
atmosphere, is not easy. The satellite reacts less to the total
energy of the blast than to the form of the flash. Nuclear explosions
have a characteristic two-humped flash caused by gamma ray induced
formation of nitrogen pentoxide (N2O5). The time between humps is
called the "bhang metre" and is characteristic of the type of weapon."
Eric
Return to January 1998
Return to “Eric Blossom <eb@comsec.com>”
1998-01-26 (Tue, 27 Jan 1998 07:36:21 +0800) - “Privacy on the Line” - Eric Blossom <eb@comsec.com>