From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.saout.de ([127.0.0.1]) by localhost (mail.saout.de [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bvgLzM4GvFeq for ; Fri, 4 Oct 2013 16:38:25 +0200 (CEST) Received: from v6.tansi.org (unknown [87.118.116.4]) by mail.saout.de (Postfix) with ESMTP for ; Fri, 4 Oct 2013 16:38:25 +0200 (CEST) Received: from gatewagner.dyndns.org (77-57-44-254.dclient.hispeed.ch [77.57.44.254]) by v6.tansi.org (Postfix) with ESMTPA id E49F120DC66B for ; Fri, 4 Oct 2013 16:38:24 +0200 (CEST) Date: Fri, 4 Oct 2013 16:38:24 +0200 From: Arno Wagner Message-ID: <20131004143824.GA6093@tansi.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Subject: [dm-crypt] cryptsetup FAQ monthly pointer 10/2013 List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: dm-crypt@saout.de http://code.google.com/p/cryptsetup/wiki/FrequentlyAskedQuestions - Added Item 5.20 (explain why SHA-1 is not broken as used in LUKS) - Fixed numbering in Section 1. Arno -- Arno Wagner, Dr. sc. techn., Dipl. Inform., Email: arno@wagner.name GnuPG: ID: CB5D9718 FP: 12D6 C03B 1B30 33BB 13CF B774 E35C 5FA1 CB5D 9718 ---- There are two ways of constructing a software design: One way is to make it so simple that there are obviously no deficiencies, and the other way is to make it so complicated that there are no obvious deficiencies. The first method is far more difficult. --Tony Hoare