From owner-freebsd-chat Sat Mar 1 19:16:46 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id TAA16868 for chat-outgoing; Sat, 1 Mar 1997 19:16:46 -0800 (PST) Received: from time.cdrom.com (root@time.cdrom.com [204.216.27.226]) by freefall.freebsd.org (8.8.5/8.8.5) with ESMTP id TAA16855 for ; Sat, 1 Mar 1997 19:16:42 -0800 (PST) Received: from time.cdrom.com (jkh@localhost [127.0.0.1]) by time.cdrom.com (8.8.5/8.6.9) with ESMTP id TAA19026; Sat, 1 Mar 1997 19:16:30 -0800 (PST) To: Charles Henrich cc: freebsd-chat@FreeBSD.ORG Subject: Re: RSA 56-bit key challenge In-reply-to: Your message of "Sat, 01 Mar 1997 21:06:54 EST." <199703020206.VAA02560@crh.cl.msu.edu> Date: Sat, 01 Mar 1997 19:16:30 -0800 Message-ID: <19022.857272590@time.cdrom.com> From: "Jordan K. Hubbard" Sender: owner-chat@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk > It looks like they are about to release a new binary-only key tester, if they > rezero the stats because of the change, shouldnt we start up a freebsd.org > team? I was kind of thinking that... :-) It would be good PR, if nothing else. > On another paranoia thought: Now that best.net has several thousand machines > grinding on keys, wouldnt it be a neat trick for them to turn that compute > power to whatever they wanted? :) Who would be any the wiser! Lets crack > passwords shall we! Zing! Maybe some softer longer keys.. zing! :) hee hee . Hey, if you have a new tool, you try and use it! :-) Jordan