Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:Who knew! (Score 4, Insightful) 156

Even one time pads are susceptible to brute force attacks.

Nope, absolutely incorrect. That's what makes one-time pads different. When the key length is the same as the plaintext length, it is possible have perfect security. Look up unicity distance.

If the original was normal human readable text it becomes immediately obvious when your brute force succeeds and a subsequent dictionary comparison of each word yields a hit.

But your brute force attack will yield every single possible plaintext (with the same length as the original plaintext). Which is the real one?

For example, if the ciphertext is BWIJAA, your brute force attack will get ATTACK for one key, and GOHOME for another. (And every other 6 character string.)

Comment Re:Infinite complexity? (Score 1) 830

The human brain is composed of one hundred billion or so neurons. Looks like it's pretty much finite to me. I have ten times as many bytes of information in my hard disk.

But a neuron is worth a lot more than a byte - it's more like a node. At least mine are - don't know about yours.

(But point taken about "infinite complexity".)

Comment Re:Moving east? (Score 4, Informative) 346

I've also read postulations that glaciers were not caused by 'ice ages' per se, so much as they were the remains of the north pole ice cap after a shift.

Umm ... Are you aware that the reason it's cold at the poles has nothing to do with the earth's magnetic field, but rather the weaker intensity of sunlight at high latitudes? Were you sick on that day in third grade?

It's a particularly interesting topic if you look at the archaeological records of our past; specifically, the polar relation/geographic locations of Egyptian, Mayan, and other ancient peoples' religious/whatever sites. They seem to predict a pole shift, or at least make subtle suggestion to one occurring in the past.

The last geomagnetic reversal took place 780,000 years ago. So, bzzt, no.

Please turn in your geek card on the way out.

Comment Any statistician could have told them that (Score 2, Interesting) 131

There's one thing that's worse than too little data: Too much data that may or may not be relevant to your task.

It's bad to have no data. But that can be remedied. Having more data than you can process, worse, data where you cannot discriminate between wheat and chaff is pretty much useless. And that's basically what we have now. They were busy collecting data left and right, not asking whether that data could be relevant. Now they're stuck with a buttload of data that may or may not be relevant.

The best solution? Toss it and start over. And this time, collect only what's relevant.

Comment Re:Context? (Score 3, Interesting) 671

I think it's really simple, for example even though I consider my bank account balance private there's probably quite a few people at the bank that at least theoretically could look at it. If I use Google apps to write a letter I consider private, it's in much the same situation. And yet, most letters I write are significantly less important or private than my bank accounts. "I can't put my letters on Google, or people would see what I write" is a bit like "I can't put my money in the bank, or people would see how much money I have". Many companies live that way too having outsourced all their basic IT, for the most part this works fine. I can see how Google doesn't provide total anonymity or privacy yet good enough for many people and those remaining people it isn't possible for Google to serve.

If you want total privacy and anonymity, you can't rely on anyone else. You have to do it all on your own computer, use anonymous networks, connect directly with your peers and not over backbones like email or facebook or skype, in short it's a whole different game. And if you're really paranoid about it, you probably want to encrypt and physically secure and make tempest-proof and screened software and... the list really goes on and on, and it doesn't stop until your computer is as secure as the deepest vault at the Pentagon. Google apps isn't the place for Top Secret documents and if that's your standard then neither it is for you.

It's all a matter of using it with reason. If you're using a google web app to edit pictures before putting them on your facebook or myspace or photo sharing site, what have you lost? Nothing. You were going to put them online at the mercy of a company and their privacy policy anyway. Which may or may not be a good idea in the first place, but at least it's fairly consistent.

Comment Re:Bottom Line: Use Long, Unusual Passwords (Score 2, Informative) 167

Wrong. Dead wrong.
Reason 1: Rainbow tables only work when the cryptosystem doesn't use salt (or uses it incorrectly). These days everyone uses salt. It's not a big secret.
Reason 2: Even if salt wasn't used, Rainbow tables aren't feasible against long passwords. Rainbow tables are essentially just saving the results of one attack and using them on subsequent attacks. If the password in question is long enough, even the "one attack" (table precomputations) will never get to that password.

So, educate yourself. Rainbows tables are not some kind of magic crypto attack. They are very limited in scope. These days pretty much all they're good for is Windows passwords and old 40-bit MS Office documents. Definitely not PGP.

Slashdot Top Deals

Intel CPUs are not defective, they just act that way. -- Henry Spencer

Working...