[vox] Fwd: [vox-tech] Fwd: Re: [suse-security] SHA-1 broken - impact on SuSE linux versions

Karsten M. Self kmself at ix.netcom.com
Thu Feb 17 00:36:24 PST 2005


on Thu, Feb 17, 2005 at 12:30:21AM -0800, ME (dugan at passwall.com) wrote:
> Karsten M. Self said:
> > on Wed, Feb 16, 2005 at 09:10:52PM -0800, Rod Roark
> > (rod at sunsetsystems.com) wrote:
> >> On Wednesday 16 February 2005 08:53 pm, wild bill wrote:
> >> > It is a very, very difficult attack requiring 2**69
> >> >  operations. The claim of "broken" is because a brute-force
> >> >  attack on SHA-1 requires 2**80 operations.
> >>
> >> Heh-heh.  What does the true geek say upon finding a way to
> >> increase his chances of getting laid by a factor of 2048?
> >>
> >> "That's not good enough."
> >
> > Weeellllll....
> >
> > ...If your initial odds exceeded the heat death of the Universe, I'd say
> > that's a fair gripe.
> >
> > Not speaking personally....
> 
> Why is sex with Computer Scientists so bad?
> 1) Computer Scientists do it with bugs
> 2) The find ways to do it faster and say they have improved performance.

Q: Why is software like sex?
A: The kind you share with other people is better.

    - Bruce Perens, at a LWCE panel, some years back.

Peace.

-- 
Karsten M. Self <kmself at ix.netcom.com>        http://kmself.home.netcom.com/
 What Part of "Gestalt" don't you understand?
    Patience is a virtue.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
Url : http://ns1.livepenguin.com/pipermail/vox/attachments/20050217/fc70cf56/attachment.bin


More information about the vox mailing list