[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: CONTEST: Name That Program!
In article <[email protected]> Nathaniel Borenstein <[email protected]> writes:
> As you may have read in my previous message, First Virtual has developed
> and demonstrated a program that completely undermines all known schemes
> for using software-encrypted credit cards on the Internet. More details
> are avialable at http://www.fv.com/ccdanger.
You are a liar.
Your program does not undermine all known schemes for transmitting
software-encrypted credit cards on the internet. You have no way of
obtaining my credit card number, because I will not run your software.
Furthermore, because I use a Unix-like operating system (specifically
OpenBSD) which I re-build from source code every week or so, you would
need to hack my compiler to keep mis-compiling itself and compromise
my kernel or netstat, ps, etc, for which you would need to be root.
The first virtual protocol seems to have some real weeknesses.
However, I do not feel like wading through all the pages of text to
figure out what is going on. I challenge you to post a concise
description of the protocol, using syntax such as:
A -> B: {ID, xxx, ...}_Ks
With short descriptions where necessary. If you do, I'm sure we can
rip your protocol to shreds (which is why you won't).
David