Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:So the FBI hacked servers to find pedos? (Score 3) 292

Murderers have rights. Pedophiles have rights. Rapists have rights.

That's right, they do. They have the same rights as the rest of us, including the right to a speedy, fair, trial by jury, and the right to remain silent. What they don't have is the right to murder, molest children, and to rape. I don't know how people don't get that.

I don't see anyone here suggesting otherwise.

Comment Re:Lets give him Obama's Nobel Prize (Score 1) 212

You don't find it disturbing that a criminal is our greatest hero of the age, specifically because he's a criminal?

If you mean to say that he is a hero because he committed a criminal act then why don't we all go and worship our heros in prison? No, actually just you asking that question has clarified it in my mind. He is a hero because he sacrificed a comfortable life to reveal the crimes of the NSA and GCHQ.

Comment Re:More Tax Money Wasted (Score 1) 201

You think that Ministry of Sound is part of the UK government?

Meybe the Ministry of Truth should spend some tax money on basic education.

Unfortunately the Ministry of Truth gave their education budget to the Ministry of Silly Walks. Can't have too many educated people walking around questioning things.

Comment Re:"Brilliant"? Hardly (Score 1) 743

Sure, it sounds like they did .. and it also sounds like this super awesome system had a gaping hole that admin could become anybody else and then just read it, because that user has access

Not the way I read it, sounds to me like as soon as he had access to their user accounts he had access to all the files in plain text, no metion of breaking encryption anywhere.

And then that's going to be the failure point in your system -- all it takes is one guy who writes his password down, and the whole thing is screwed.

I'm not crypto expert, but let's do a thought experiment.

Let's say that I've got a bunch of people, and 3 levels of security.

So, if we want all of the people (all of whom have the lowest level of security for sake of argument) to have access, we get one of two scenarios. You have a single decryption key they all share, and the first person to accidentally leak it screws it up for everyone. Or, you have to build a crypto system which will allow the same information to be decrypted using multiple decryption keys -- and my first thought is the more different ways you can decrypt the more likely it is that someone can break into it by crafting a key which also works because it's no longer unique.

Same goes the other way ... does the decryption for the most secure level also open up all of the low-level stuff? In which case, you can narrow your targets down to just the ones with the most permissive key. Because those give you the keys for absolutely everything.

You could try to have a broker which authenticates you, and from there grabs the key it will need to decrypt and then use that .. but then your broker becomes the target because it's got access to everything.

And, you'll probably have corner cases in which generally someone is only allowed the lowest level of access, but for specific things you can get 'read in' on stuff that needs you to escalate your access -- but *only* for that and nothing else. You could also have cases where you have a second group of documents in the "highest access possible" category not accessible to everyone at that level -- say, the OPR at the FBI where you might be investigating the top people and need to keep that secret from them.

I'm sure there's been literally volumes written on this, by people who have far more qualifications than I on the topic. But in general, I think the whole problem of guaranteeing only authorized users can ever access something at a given time is a hard problem. Because the more permutations on what you're trying to do, and the more people involved in it, the more places where there could be gaps.

Any security system will have holes but it would have been a whole lot harder for Snowden to get hold of the information he did if he had to loiter around peoples offices which he probably had no business being in( read plausible excuse) searching below desks for handy post-its, that or find an accomplice that had the correct encrytion codes. So I agree that no system is completely secure, but they certainly can be more secure.

Comment Re:"Brilliant"? Hardly (Score 1) 743

The admin has access to all accounts for sure, that seems pretty clear, but could they not implement a system whereby sensitive files are encrypted and only accessable by authorised users(correct security clearance)? That would involve the users managing their own passwords on the encryption software in question, but surely the people employed by the NSA should be competent to do at least that?

Comment Re:Need Light For Security (Score 1) 130

but energy use drives progress and quality/length of life. we need a plan of producing increasing amounts of energy that is carbon neutral and with no lingering waste products (which advanced reactors can do).

All very good points, but wasted energy helps none of these things. Also sustainability is at least if not more important than carbon neutrality, I have a feeling that figures that are produced for carbon neutrality are so manipulated as to be useless IMO.

Comment Re:Need Light For Security (Score 1) 130

I understand where you're coming from, 55% of your local energy is nuclear, so that's one thing that makes a big difference to fossil fuels in your areas fuel mix. That however wasn't my point, my use of barrels of oil was an arbritary measure of energy use to make the point that 1.6% of world energy in not an insignificant figure. Without getting into the advantages and dissadvantages of nuclear, the real issue we face is reducing our power consumption altogether, not just hydrocarbons. Any sustainable energy solution is going to be made easier/possible by a reduction in worldwide energy use whether its nuclear,wind power or anything else. So, initiatives such as this one have my full support because it deals with two issues, light polution gets on my nerves (I too could drive for an hour to see the stars better, but where I grew up that wasn't the case, wouldn't it be nicer not to have to?), and a not insignificant reduction in energy use. Whats not to like?

Comment Re:Need Light For Security (Score 2) 130

Quite simply because there is never going to be just one thing that can make that big a difference all by its self. What's more likely, finding 20 measures that can make 1-2% difference each, or one thing that would make 20-40% difference? ( or whatever your threshold for worthwhile is). While you're thinking about it, why don't you leave all of your electrical appliances on all the time? It would be statistically insignificant and therefore affect no-one.

Comment Re:Need Light For Security (Score 4, Informative) 130

actually, by the site's own claims 22% of energy is used for lighting, and 8% of the 22% for outdoor lighting.....1.6% is not much to be worried about saving a portion of, sorry.

From a wikipedia http://en.wikipedia.org/wiki/World_energy_consumption article on energy usage

Energy consumption in the G20 increased by more than 5% in 2010 after a slight decline of 2009. In 2009, world energy consumption decreased for the first time in 30 years, by 1.1%—equivalent to 130 megatonnes (130,000,000 long tons; 140,000,000 short tons) of oil—as a result of the financial and economic crisis, which reduced world GDP by 0.6% in 2009.[11]

So 1.6% of that is 2080000 long tons of oil per year based on 2009 figures, it's almost certain that figure is higher now. Now work out how many power stations it would take to create the equivalent output. Not so insignificant?

Comment Re:Stupid scenario (Score 2) 154

An example that is flawed for sure, what about a situation where someone needs emergency surgery and this could be performed by proxy by a willing bystander? There are definitely potential uses for a mature version of this technology, most of them are quite scary though. I do not like the idea of this being done to me. In reality though I think for all the 'save the day' scenarios in which this could be useful it would have to be a ubiquitous technology, now that's pretty damn unlikely even if it does mature so that would leave specialised applications. Any takers?

Comment Re: Government vs terrorists (Score 1) 395

Journalists knew the date of d-day. * Several journalists actually joined the troops as far as I know, however, how is these journalists revealing information about the landings comparable to Manning and Snowden? Firstly Manning and Snowden didn't endanger any lives but their own, let alone hundreds of thousands, secondly if the journalists did reveal the landing date in a public newspaper/s how do you think the Germans would have verified that information, given the the level of misinformation that was common in secret communiques at that time and more so in the public press. In short none of your argument makes any sense.

I don't think I am aware of anyone as committed to a secret surveillance state as you are, if you don't already work for the NSA you really should apply.

Comment Re:It's all good until (Score 1) 245

Now you're making me argue the case for weaponization, but that's OK. Heres one, North Korea start to ready their missiles to fire at Taiwan and don't respond well to diplomacy(not hard to imagine), I don't know exactly what an intense beam of microwaves would do to the propellant in those things but I would like to observe the results from a safe distance. In the case of Nuclear or Chemical weapons what good would they do in this situation? Or if you really wanted to nuke an enemy without getting nuked back use a few of these things to take out their offensive capability and hey presto, nuke away to you're hearts content. Actually that could be the next Bond plot, ex NSA crazy person(insert back story here) builds enough of these to destroy the rest of the worlds nuclear capability leaving his crazy country of choice (Iran/North Korea/France/........) as the only remaining nuclear power muhahahaha, only an inexplicably young looking British agent can save the world.

Comment Re:It's all good until (Score 2) 245

The problem is: How do you prove that it was an intentional event, as opposed to a malfunctioning of the controls?

Or what if one country hacks into another country's control system and uses one of their satellites as weapon? If the satellite happens to be on the other hemisphere (so there's no danger of accidentally hitting the own country), they don't even need to have control. Just DoS the other country's control, and have the out-of-control satellite burn populated areas at random.

Something like a system whereby the satellite will only transmit when it is within a fraction of a degree of its normal orientation, or a signal constantly transmitted by the base station when it is receiving, a combination of both. That's just off the top of my head while I'm at a party I'm sure the researchers involved have thought about this a lot.

Comment Re:It's all good until (Score 3, Insightful) 245

It seems like the fear of weaponisation is whats kept this sort of thing from being explored more fully, up till now of course, but I think that there are logical arguments that prevent this from being an issue. For instance if country 1 put up enough of these things they would be able to supply a large proportion if not all of their countries energy needs creating a significant economic advantage for country 1. Said country then decides to point one elsewhere to burn down a city or military installation in country 2 therefore breaking the International space treaty and probably many others, and the international community forces country 1 to dissasemble their SPS-alpha capability, causing them severe economic dissadvatage.

TLDR using these as weapons makes no economic sense.

Slashdot Top Deals

Money is the root of all evil, and man needs roots.

Working...