[147761] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] [RNG] on RNGs, VM state, rollback, etc.

daemon@ATHENA.MIT.EDU (John Denker)
Sun Oct 20 12:20:53 2013

X-Original-To: cryptography@metzdowd.com
Date: Sun, 20 Oct 2013 06:30:14 -0700
From: John Denker <jsd@av8n.com>
To: Cryptography <cryptography@metzdowd.com>, 
	"rng@lists.bitrot.info" <rng@lists.bitrot.info>
In-Reply-To: <21091.24135.234665.637962@desk.crynwr.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

On 10/19/2013 09:38 PM, Russ Nelson wrote:
> John Denker writes:

<snip>

> Crypto without a threat model is like cookies without milk.
> 
> You're making a claim about the security of a cryptographic algorithm
> without specifying the threat model. You are, technically, in a state
> of sin. I forgive you my son. Your penance is to memorize another 30
> digits of pi.

Could we please dial back the ad_hominem nonsense?
If we can't be respectful, could we at least be factual?

It is kinda comical to see the one guy who actually /has/
discussed a range of threat models (e.g. 10/19/2013 02:21 PM)
patronized via sweeping value judgments with no discernible 
connection to any of said threat models.

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post