User contributions for 24.7.68.35
Appearance
For 24.7.68.35 talk block log logs global block log filter log
11 June 2010
- 04:5204:52, 11 June 2010 diff hist +204 Google Chrome Frame make privacy complete/accurate/not a section. say "chrome frame is based on the open-source chromium", analogous to how you talk about google chrome itself
5 June 2010
- 00:5000:50, 5 June 2010 diff hist −94 JavaScript →Debugging: shorten/clarify sentence about different JS environments and testing/debugging
- 00:2500:25, 5 June 2010 diff hist +267 JavaScript →Cross-site vulnerabilities: clarify usefulness/limits of XSS auditors in browsers, remove {{update}} that didn't have a note on the talk page
22 May 2010
- 14:5514:55, 22 May 2010 diff hist −2 External sorting →Tuning performance: "Faster" is awkward without saying what's being compared to
21 May 2010
- 21:5921:59, 21 May 2010 diff hist +2 X86 →x64: avoid implication that x86-64 is the first *anything*, note itanium is no longer widely used, clarify what NX bit does.
- 21:5321:53, 21 May 2010 diff hist +6 X86 →x64: as worded, implied Itanium was the *first* architecture w/64-bit addressing, when at least the Cray-1 and RISC came earlier (according to 64-bit)
12 May 2010
- 06:0606:06, 12 May 2010 diff hist +16 Cryptanalysis →Modern cryptanalysis: it's a tad unfair to blame WEP and RapidSSL hacks partly on protocol "flaws" -- the protocols would've worked with good primitives, though they could have been more robust
27 April 2010
- 04:2304:23, 27 April 2010 diff hist +39 Tata Docomo clean up list (it duplicates the bulleted list below, but whatever)
18 April 2010
- 18:4618:46, 18 April 2010 diff hist +454 Talk:NIST hash function competition →Move to "SHA-3 competition" or "SHA-3 process"?: new section
12 April 2010
- 05:1605:16, 12 April 2010 diff hist −9 SWIFFT No edit summary
9 April 2010
- 01:5001:50, 9 April 2010 diff hist 0 Cryptanalysis →See also: related topics first? why not.
- 01:4901:49, 9 April 2010 diff hist −12 Cryptanalysis →Related topics: cute, "economics of information security" is bold in the lede but there's no redirect
- 01:4801:48, 9 April 2010 diff hist +358 Cryptanalysis →See also: Link to related topics in infosec, fwiw
- 01:3701:37, 9 April 2010 diff hist +55 Cryptanalysis →Modern cryptanalysis: add DECT
7 April 2010
- 23:1723:17, 7 April 2010 diff hist −26 Isolation (database systems) →READ UNCOMMITTED (dirty reads): not sure all implementations of repeatable read do ensure updates appear in order in practice
4 April 2010
- 06:4506:45, 4 April 2010 diff hist +829 Talk:Cryptanalysis →Replacing "cryptosystem" with more specific terms, quantum computation, protocol break: new section
- 06:2506:25, 4 April 2010 diff hist +23 2008 United States presidential election →Race: this is self-reported data; poll doesn't prove what effect race had, only what effect voters said it had
31 March 2010
- 16:1416:14, 31 March 2010 diff hist +461 N Talk:Post-quantum cryptography Cryptography without/before PKC
- 15:5715:57, 31 March 2010 diff hist +5 Post-quantum cryptography sigh, another typo fix
- 15:5715:57, 31 March 2010 diff hist −4 Post-quantum cryptography everyone have some of "the McEliece"
- 15:5615:56, 31 March 2010 diff hist +57 Post-quantum cryptography examples for everybody! except multivariate -- lede clames only HFE signatures are unbroken and they have no separate article
- 15:5215:52, 31 March 2010 diff hist +43 GGH encryption scheme No edit summary
- 15:5115:51, 31 March 2010 diff hist +109 Post-quantum cryptography No edit summary
25 March 2010
- 23:0323:03, 25 March 2010 diff hist −60 UTF-8 →Advantages: generalize "encoding not stated in the file" to "recieving end can't figure out what's going on"
22 March 2010
- 15:0715:07, 22 March 2010 diff hist −38 UTF-8 →Invalid byte sequences: not sure "strict parsing doesn't work" is widely accepted or just editor's opinion.
18 March 2010
- 19:5819:58, 18 March 2010 diff hist +229 User talk:Intgr/Archive 5 →Post-quantum cryptography: new section
17 March 2010
- 22:3522:35, 17 March 2010 diff hist +29 Quantum computing →Potential: fix typo "security by a quantum computer"
- 22:2822:28, 17 March 2010 diff hist −210 Quantum computing →Potential: this doesn't compute: this section's about the potential *if* large quantum computers existed, and if they did, longer RSA keys would only increase attacker's effort polynomially
- 20:3420:34, 17 March 2010 diff hist +3 Quantum computing →Potential: embarrassing typo
- 20:3120:31, 17 March 2010 diff hist +1,754 Quantum computing →Potential: References!
- 18:1518:15, 17 March 2010 diff hist +86 Quantum computing →Potential: avoid any suggestion that AES and n-DES would be flat-out broken by QC
- 18:0418:04, 17 March 2010 diff hist +549 Quantum computing →Potential: discuss more specifically where quantum computing leaves cryptography -- maybe this belongs in a Quantum cryptanalysis stub or Cryptanalysis
- 06:1706:17, 17 March 2010 diff hist +228 Cryptographic hash function →Hash functions based on block ciphers: dunno how useful, but note that some SHA-3 candidates are based on keyed invertible transforms and some aren't
- 05:1805:18, 17 March 2010 diff hist +26 Cryptanalysis →Modern cryptanalysis
15 March 2010
- 22:3922:39, 15 March 2010 diff hist −96 Bit-flipping attack the rest of this article still needs lots of love but fix the two {{fact}}s
- 03:2203:22, 15 March 2010 diff hist +5 Cryptanalysis →Modern cryptanalysis: further hysteria-avoidance -- clarify that researchers, not black hats, did the 2008 ssl/md5 hack
- 01:3301:33, 15 March 2010 diff hist −25 Cryptanalysis →Modern cryptanalysis: k, [http://www.acsac.org/2005/papers/Snow.pdf] says Snow was technical director of three areas, shorten title again
- 01:2901:29, 15 March 2010 diff hist +6 Cryptanalysis →Modern cryptanalysis: avoid sowing hysteria -- note that WEP was superseded and RapidSSL cleaned up their act
- 01:1801:18, 15 March 2010 diff hist +25 Cryptanalysis →Modern cryptanalysis: "technical director, information assurance" seems to be Snow's fuller title, but different pages refer to him different ways
- 00:2900:29, 15 March 2010 diff hist +7 Cryptanalysis →Modern cryptanalysis: there's a neutral version of this thought that belongs somewhere, but reads like editorializing in this context
- 00:2600:26, 15 March 2010 diff hist +1,838 Cryptanalysis →Modern cryptanalysis: Note SSL break, brute-force search, Brian Snow "mature field" quote, give examples of recent non-cryptanalytic vulnerabilities, bullet-point modern cryptanalysis list.
12 March 2010
- 21:2421:24, 12 March 2010 diff hist +15 Cryptographic hash function →Concatenation of cryptographic hash functions: "as strong and not stronger" than its best component is overstating it
- 21:0821:08, 12 March 2010 diff hist −251 SHA-1 →Official validation: this has been {{fact}} for more than a year without a cite, bye bye
- 21:0821:08, 12 March 2010 diff hist −37 SHA-1 replace {{fact}}ed "best established" phrasing with less disputable "most widely used"
6 March 2010
- 21:5721:57, 6 March 2010 diff hist +340 Talk:Cryptanalysis →Legal issues
- 21:5521:55, 6 March 2010 diff hist +29 Talk:Cryptanalysis →Putting attacks in perspective: brute forcing
- 21:5421:54, 6 March 2010 diff hist +969 Talk:Cryptanalysis →Putting attacks in perspective: new section
- 21:4321:43, 6 March 2010 diff hist +245 Cryptanalysis →Computational effort required: rephrase, note imprecision in stating attacks' difficulty
11 February 2010
- 23:5623:56, 11 February 2010 diff hist −36 JavaScript →Cross-site vulnerabilities: {{undue}} refers to giving one POV in a debate undue weight and there's no debate here. don't think this is too detailed given article length; can discuss on talk
- 19:5019:50, 11 February 2010 diff hist +156 Advanced Encryption Standard →Security: ref the cryptanalysis section on academic v. practical attacks