[vox] Fwd: [vox-tech] Fwd: Re: [suse-security] SHA-1 broken -
impact on SuSE linux versions
Karsten M. Self
kmself at ix.netcom.com
Thu Feb 17 00:36:24 PST 2005
on Thu, Feb 17, 2005 at 12:30:21AM -0800, ME (dugan at passwall.com) wrote:
> Karsten M. Self said:
> > on Wed, Feb 16, 2005 at 09:10:52PM -0800, Rod Roark
> > (rod at sunsetsystems.com) wrote:
> >> On Wednesday 16 February 2005 08:53 pm, wild bill wrote:
> >> > It is a very, very difficult attack requiring 2**69
> >> > operations. The claim of "broken" is because a brute-force
> >> > attack on SHA-1 requires 2**80 operations.
> >>
> >> Heh-heh. What does the true geek say upon finding a way to
> >> increase his chances of getting laid by a factor of 2048?
> >>
> >> "That's not good enough."
> >
> > Weeellllll....
> >
> > ...If your initial odds exceeded the heat death of the Universe, I'd say
> > that's a fair gripe.
> >
> > Not speaking personally....
>
> Why is sex with Computer Scientists so bad?
> 1) Computer Scientists do it with bugs
> 2) The find ways to do it faster and say they have improved performance.
Q: Why is software like sex?
A: The kind you share with other people is better.
- Bruce Perens, at a LWCE panel, some years back.
Peace.
--
Karsten M. Self <kmself at ix.netcom.com> http://kmself.home.netcom.com/
What Part of "Gestalt" don't you understand?
Patience is a virtue.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
Url : http://ns1.livepenguin.com/pipermail/vox/attachments/20050217/fc70cf56/attachment.bin
More information about the vox
mailing list