Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:get to work (Score 2) 309

Agreed. The CLI of gpg is horrible. There are some semi-acceptible GUI variants, not least Enigmail, and a good UI is is definitely going to be required if you are going to get general acceptance.

But the main reasons it continues to not get used are

0) Math* is hard!
1) The rise of webmail
2) Inverse network effects

* encryption being a subset of math.

0) It's hard to explain to people that they need encryption, how it works, what it is. People think email is secure! The "envelope" iconography is very misleading - email is more like a postcard, delivered by a random selection of disreputable postmen.

1) Webmail makes it much harder to do encrypted mail because to make it secure you'd have to install browser plugins. None of the webmail providers want to make one, because it will destroy their revenue stream of monetizing the analysis of your mail traffic.

2) If you want to actually use (G)PG(P) your recipient also has to grok it, install software to use it, and you have to exchange keys. This is a massive hurdle to overcome for all but the most dedicated cryptonerds. Until there is a majority of people who want to use encrypted mail, that will carry on being the case.

There are projects attempting to overcome some of these hurdles ; you have the likes of keybase.io that takes some of the sting out of key exchange (and verification).

But!

Until encryption comes with the communications software you are using out of the box, is enabled by default, interoperates with everything properly, and forces you to configure it to even use it, the vast mass people won't use it. And this is well known by the SIGINT agencies who view people actually using encryption AT ALL as a red flag that they should look closer at.

Comment In concert with the UK (Score 1) 406

The same burblings emerged from our Prime Minister a few weeks ago.

From him, it was potentially forgivable as the technically ignorant ramblings of a politican trying to score some election points.

From the Director of the NSA.... he knows exactly what he's asking for. Compulsory key escrow.

They tried this already with Clipper. They were unanimously told where to shove it. Are we really going to have to fight this battle every 20 years?

Maybe he's just acting out all petulant because their biggest hack, stealing the keys from Gemalto, has come to light and they aren't going to be able to pull that one again in a hurry.

Comment Re:Greek Myths (Score 2) 253

Fascism is the natural end state of capitalism; the concentration of power eventually means that the state and the corporation merge and things are done for the benefit of the corporation.

You can't have unregulated capitalism without it devolving into fascism. I think the UK and the US are already there - the essential dishonesty of our leaders, who publicly claim to want to do the best for us, then turn around and do the best for their corporate masters. The careful creation of a rhetoric of "them and us" to justify military action which just takes what they have and has us foot the bill (and much of it goes to private contractors). The brutal destruction of our public welfare systems to clear the way for much more profitable and expensive corporate systems.

Without regulation, how does this go down? Really, the only difference would be that you'd be cowed by the private armies of the corporations, rather than the force deployed by government on their behalf. Rich men act to protect what is theirs. They fear being bereft of it. The only way people lack fear is if they feel in control, and when your interests are so large, that needs a lot of control.

Comment Re:Greek Myths (Score 2) 253

"Crypto" is also a terrible misnomer for cryptographically secured currencies :-)

They aren't hidden. They are public. BitCoin only works when the entire transaction ledger is available to all it's users.

In contrast, banks keep their ledger as private as possible. Historically this stems from the fact that you had to keep it secure - or people would just alter it. Then the secrecy became something that people relied on and almost more important than the security.

Comment Re:Greek Myths (Score 0) 253

More like the capitalists don't dare let them succeed. It would show the world that there was another way, and demands to go that way would escalate in other states.

A cryptocurrency would be a bold step ; placing control of the money under the government, or the people, instead of a private bank.

The real problem is "Klepto" currency - the fiat currency that's thought up out of nothing. Yes, it provides liquidity, but it also provides power. If concentration of weath begets more wealth, then the guy who can grind out as much as he likes can use it to steal everything from everyone else, which is what is by and large happening.

Comment Re:Correlation and causation again (Score 3, Interesting) 96

Sounds like Reason..

Reason allows users to specify in advance the decision they want it to reach, and only then to input all the facts. The program's task was to construct a plausible series of logical-sounding steps to connect the premises with the conclusion. The only copy was sold to the US Government for an undisclosed fee.

Comment Re:What about computers? (Score 1) 192

They messed with an algorithm for generating pseudo-random numbers ;

Schneir's article

TLDR : the suspicion is that they embedded a secret key in the maths of this random number generator algorithm that would let them break any TLS connection after snooping 32 bytes of traffic.

As Bruce takes pains to point out, you can't prove anything. But really, they were pushing an RNG with no obvious advantage over the others in the running (3x slower), known flaws (slight bias in it's output), and this great big whopping potential security hole that you might conveniently exploit if you were the one who picked the "random numbers" in the appendix.

Comment Re:I think people do not understand how deep it is (Score 1) 192

Yeah, that surprised me a bit.

If you replaced the symmetric key with a genuine private-key smartcard and registering on the network involved a proper negotiation and establishment of an ephemeral session key, things would be a lot more secure.

Oh, and more expensive, 'natch, which is why it's not designed like that - stupid legacy tech.

Comment Re:How is this even remotely legal? (Score 1) 192

That may well be true... but the purpose of the hack is to spy on the US populace - that's the reason to have copies of these keys.

The actual hack may be within their operational remit, but the materiel they gathered using it is clearly for purposes that are not. You can't really justify the operational budget for it in that case.

Slashdot Top Deals

Real Users know your home telephone number.

Working...