Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Best buy (Score 2) 198

Apparently yes, even the original poster seems very sad to see them disappear as the end of his summary let us think:

"Still, it's sad to see such an iconic brand killed off like this."

I suspect he is an employee of Past Shop. I really don't see what Past Shop has to do with news for nerds. Any nerd is going at Past Shop for a fix? I am not aware of any. This is a last resort solution when you need a gizmo widely available and you need it NOW.

Comment Re:Prepare to restore from backup often (Score 3, Insightful) 267

I'm sorry, but even if the hash seems hard to any human being, the way it was generated doesn't use enough entropy. Using the website fqdn or whatever combination reduces significantly the entropy, coupled with your master password in a predictable way and then generating the hash isn't sufficient at my humble opinion to say this is a secure way to generate a password. In particular, if someone has access to the resulting hash for many different sites. The result must be predictable, hence, the combination of the orignal factors cannot change.

This isn't better than a long passphrase.

Comment Re:is this good? (Score 1) 159

I know about a bank that forces you to pick a password starting with three digits numbers, then you can use letters. This is one of the most idiotic security rule I have every seen. First of all, it reduces the entropy significantly and second it forces many people to write down their passwords because they cannot remember them because of the three digits number rule. Or they pick the three digits from their birthdate, street number, phone number or something like that.

However, after three wrong trials, your account is locked and you have to go to your branch to get a fresh new password printed on a sheet of paper.

And for an unknown reason, you have to go to your branch, you cannot go at any branch or even head office. On another hand, you can get the password over phone.

I don't know who is the chief security officier, but I want his job.

Comment Re:Who you gonna call? (Score 3, Informative) 138

And the biometrics data hasn't have to be saved in clear anywhere, it can just be encrypted with a one-way crypto algorithm with the key to encrypt stored in the TPM. Then, the device collects the biometrics data, encrypt it with the key in the TPM and compare the resulting signature with the stored encrypted signature. If they match, you are the right guy, if not you are not authorized. Nobody can steal you biometrics data unless they temper with the hardware and introduce an hardware trojan horse. Getting the crypted data will not leak any useful information since it is equivalent to a very long password with very high entropy. A brute force method would take thousands years to crack it. And getting the key will not help since it is a one-way algorithm and the key is useless to decrypt.

Comment Re:OK, but... (Score 1) 89

Fortunately, for that purpose, we have Pol Pot, Staline, Mao, Leopold II of Belgium, Ismail Enver, Kim Il Sung and few others. It is about time racism cease, Germans are not the only one who have perform massive killings in the 20th century.

Comment Re:IOT is suicide (Score 1) 108

It is not event an example of IoT. The wallet doesn't connect to the internet, it sends a signal to a smartphone app and the smartphone app starts crying when it no longer recevies the signal. Kind of Tamagochi. At no point internet is involved. So, why the OP talked about IoT in first place? Did he lost his mind? That's why he connected his brain on the internet so that /. can alert him he lost his mind?

Comment Re:I have said it before (Score 1) 384

Nuclear power is less expensive than wind farms, solar panel fields and large hydro-electricity projects. Coal, natural gas and oil are less expensive and they are the main reason why the nuclear power industry is struggling these days. You obviously don't know anything about the electricity industry in the world. It is a shame people marked your comment as insightful while it is not.

Comment Re:Krebs (Score 3, Interesting) 230

Having written the on-line banking communication protocol of a bank back in 1995 I can assure you they were not taking security seriously. I explicitly asked about requirements for encryption and they had none. They didn't want to bother with encryption because the infrastructure was running on dialup lines connected directly to their infrastructure and they wanted to be the first bank to make on-line banking available to its customers. At this time, the internet was in its infancy, hence the choice for the dialup infrastructure, and everyone was subscribing dialup lines for the Internet access DSL and cable-modem was still waiting to be invented. It was even Windows 3 and OS/2.

Slashdot Top Deals

In any formula, constants (especially those obtained from handbooks) are to be treated as variables.

Working...