Scott Brickner <sjb@universe.digex.net> (85 posts)

Be aware that many list participants used multiple email addresses over their time active on the list. As such this page may not contain all threads available.

Threads

subjective names and MITM

Re: subjective names and MITM

Re: subjective names and MITM

Re: Certificate proposal

MITM garbage

MITM evasionMITM evasion

Banque des Cypherpunks

Anguilla Cypherpunks Meeting

DalSemi: Add-Only Memory for Storage of Digital Cash

Re: java flaw

Re: I want to learn!

Anonymity: A Modest Proposal

digital cash and identity disclosure

Don’t Kill the Messenger–A New Slant on Remailers

Re: Reducing the Flames, Attacks, and Nit-Pickings

Re: Verification of Registration

Re: Re: Reformated: How secure….

A secure cryptosystem with a 40-bit key?

New release of CFS Unix encrypting file system available

Re: InfoWar

Re: /dev/random for FreeBSD [was: Re: /dev/random for Linux]

Re: CJR returned to sender

FBI seeks huge wiretapping system

Re: /dev/random for FreeBSD [was: Re: /dev/random for Linux]

Info needed on observers

censored? corrected

Re: lp ?

So much for free speech…

ecash speed

NSA, ITAR, NCSA and plug-in hooks.

Re: NSA, ITAR, NCSA and plug-in hooks.

Re: NSA, ITAR, NCSA and plug-in hooks.

Re: NSA, ITAR, NCSA and plug-in hooks.

Re: Repeated Words/characters in Password/Phrase

Re: MED_vac

ecash casino

Re: Barring access to Netscape

towards a theory of reputation

Re: INTERNET SECURITY RISKS FOR CONSUMERS OVERBLOWN

Re: Netscape gives in to key escrow

Re: towards a theory of reputation

re: NIST GAK export meeting, sv

Re: Solution for US/Foreign Software?

DOS - MD5 - Thanks

Employer Probing Precedents?

Re: Proxy/Representation?

Re: Guerilla Internet Service Providers (fwd)

Will the real Anonynous please stand up

Re: Starting an e-cash bank

Re: (none) [httpd finding your identity]

exposure=deterence?

noise levels

Secrecy of NSA Affiliation

Enforcing the CDA improperly may pervert Internet architecture

Re: Enforcing the CDA improperly may pervert Internet architecture

Re: questions about bits and bytes

Re: Protocols at the Point of a Gun

Re: Protocols at the Point of a Gun

Re: Digital Cash Escrow

Re: PICS required by laws

Re: why compression doesn’t perfectly even out entropy

Bernstein ruling meets the virus law

arbiter/escrow agent for hire

The Joy of Java

Re: PICS required by laws

Remailer chain length?

Re: Multiple Remailers at a site?

Re: Multiple Remailers at a site?