Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment You can't win, Darth Blanchfield (Score 1) 731

Sorry Blanchfield, but Adblock can fetch the ads and then simply not show them.

And Yablonka, Adbock can simply block *all* images since most are superfluous anyway and only allow through those it really trusts.

Sorry to break it to you the both of you Blanchfield and Yablonka, but no plan survives its first encounter with the enemy.

Comment LOL "investigators" (Score 2, Informative) 222

Comment Explain the usage restrictions on image? (Score 1) 62

http://www.eurekalert.org/multimedia/pub/66682.php?from=257191 Credit: NASA & ESA, STScI-PRC14-06b Usage Restrictions: News organizations may use this image in connection with reports about exoplanetary research.

WTF? News organisations can, but but bloggers or amateur astronomers can't? Can't use it for reports about other things? It's a shitty low resolution image anyway. Are they scared someone will write an best selling game around it? Usual institutional anti-fair use paranoia off something probably spawned from a public research grant anyway.

Comment Greed (Score 1) 228

Problem is it's way beyond terrorism and well into commercial espionage. Here a politician used Australia's spy agency to spy Timor Leste's government to help Woodside Petroleum screw them over in negotiations. The politician is now an employee of Woodside Petroleum. This is one case we know about. http://www.independent.co.uk/news/world/australasia/lawyer-acting-for-east-timor-is-raided-by-australian-agents-8983566.html

Comment Enough of these government shills (Score 4, Insightful) 228

LOL all these "anonymous cowards" posting pro-government public relations. If they're tonguing government's balls why would they need anonymity? I smell government public relations all paid for with your taxpayer dollar.

Way to ignore another story and the FISA finding that the government was breaching the Constitution. http://www.usatoday.com/story/news/nation/2013/12/16/judge-nsa-surveillance-fourth-amendment/4041995/ http://news.firedoglake.com/2013/08/22/fisa-court-ruled-nsa-program-unconstitutional-said-nsa-misled-them/ That you're ignoring these smacks of a shill. The right and left are united on this. On the other side are government workers like yourself living a parasitic existence off the hard-working taxpayer.

> Snowden is a sellout who took what he had and likely ran to the highest bidder with the info.
Not a shred of evidence do you have. Now get a real fucking job, you piece of shit government shill.

Comment RSA official response is limp and evasive (Score 2) 291

RSA's official response is limp and evasive. It makes no mention of the $10M payment. Even the PR spokesliars couldn't turn this truck load of pig shit into a silk purse https://blogs.rsa.com/news-media-2/rsa-response/

> We made the decision to use Dual EC DRBG as the default in BSAFE toolkits in 2004, in the context of an industry-wide effort to develop newer, stronger methods of encryption. At that time, the NSA had a trusted role in the community-wide effort to strengthen, not weaken, encryption.

Then why did they have to pay you to use a 'good' algorithm? If all they had to do is convince you it was awesome that would have been enough. How fucking dumb do you think we are?

> This algorithm is only one of multiple choices available within BSAFE toolkits, and users have always been free to choose whichever one best suits their needs.

Fuck you, RSA. You made it the default, knowing most people would trust and use it for that reason. You fucking well know if one of the options was starred 'NSA paid us $10M to make this one the default' no one would have touched it. Remember the public suspicion when Microsoft's NSAKEY was discovered. Don't bullshit us that RSA didn't know about that.

> We continued using the algorithm as an option within BSAFE toolkits as it gained acceptance as a NIST standard and because of its value in FIPS compliance. When concern surfaced around the algorithm in 2007, we continued to rely upon NIST as the arbiter of that discussion.

Then you should have gone back to NSA and said "Hey look, you paid us $10M to use a flawed algorithm. You are supposedly experts in encryption. We aren't stupid. What the fuck are you trying to pull on us and our customers?"

And that's the scenario that assumes they *didn't* know.

> When NIST issued new guidance recommending no further use of this algorithm in September 2013, we adhered to that guidance, communicated that recommendation to customers and discussed the change openly in the media.

Fuck you. It was out in the open by then. You could hardly hide it them, and you still didn't warn your customers their data might have been compromised.

> RSA, as a security company, never divulges details of customer engagements,

Like $10M Bribes? Or agreements with one customer to fraudulently sell flawed software to other customers? I bet lawyers everywhere can smell big class actions off this one!

> but we also categorically state that we have never entered into any contract or engaged in any project with the intention of weakening RSAâ(TM)s products, or introducing potential âbackdoorsâ(TM) into our products for anyoneâ(TM)s use.

Oh fucking puleaze. "intention" is a bullshit cop out that means you did it but didn't fucking us over wasn't the primary reason. If that $10M was so clean, show us the contract and the minutes of meetings. If you don't, don't expect us to trust you. And if they don't exist even though this is all above board, why?

RSA is either incompetent or malicious. Either way it can't be trusted again. Security companies can't operate unless their customers trust them. RSA is dead.

Comment Re:RSA's name is now mud (Score 5, Insightful) 291

What you are saying is incorrect. In the UK if I tell you a lie about someone, and you repeat it publicly, you can be sued for libel. The fault is yours for not verifying the damaging information before you published it. Merely printing a retraction isn't enough, because once the accusation is made it sticks in the public mind. Otherwise I can call you a pedo, and retract it later. It doesn't work that way. Sometimes a retraction might satisfy the defamed party, but if the damage is significant they can decide to sue you anyway. In this case no one would ever trust RSA again, so the damage is severe. If the story was fake, RSA could sue the Guardians arse off.

As for your theory that competitors leaked this to damage RSA, you have not offered a shred of evidence, and your premise that the Guardian can print untrue stories without being sued for libel is false.

Comment RSA's name is now mud (Score 5, Interesting) 291

The Guardian ran the story. If it wasn't true RSA could sue their arses off in court for the value of their now worthless business. Guardian wouldn't dare run it unless they could prove it is true. http://www.theguardian.com/world/2013/dec/20/nsa-internet-security-rsa-secret-10m-encryption

Slashdot Top Deals

To write good code is a worthy challenge, and a source of civilized delight. -- stolen and paraphrased from William Safire

Working...