Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Submission + - Experian breach exposed 200 million Americans' personal data over a year ago

BUL2294 writes: CNN Money is reporting that, prior to the Target breach that exposed information on 110 million customers, and prior to Experian gaining Target's "identity theft protection" business from that breach, Experian was involved a serious breach, to which nobody admits the scope of. Their subsidiary, Court Ventures, unwittingly sold access to a database to a Vietnamese fraudster named Hieu Minh Ngo. This database contained information on some 200 million Americans, including names, addresses, Social Security numbers, birthdays, work history, driver's license numbers, email addresses, and banking information. "Criminals tapped that database 3.1 million times, investigators said. Surprised you haven't heard this? It's because Experian is staying quiet about it. It's been more than a year since Experian was notified of the leak. Yet the company still won't say how many Americans were affected. CNNMoney asked Experian to detail the scope of the breach. The company refused. "As we've said consistently, it is an unfortunate and isolated issue," Experian spokesman Gerry Tschopp said."

Submission + - Is encryption for the public now a myth?

TechForensics writes: We all know the TrueCrypt story-- a fine, effective encryption program beginning to achieve wide use. When you see how the national security agency modified this tool so they could easily overcome it, you'll probably understand why they don't complain about PGP anymore. The slip that showed what was happening was the information that NSA "were really ticked about TrueCrypt" either because they couldn't circumvent it or found it too difficult. From the standpoint of privacy advocates, NSA's dislike for TrueCrypt was evidence it was effective.

Next, NSA directly wrapped up the makers of TrueCrypt in legal webs that made them insert an NSA backdoor and forbade them from revealing it was there. It's only because of the cleverness of the TrueCrypt makers the world was able to determine for itself that TrueCrypt was now compromised. (Among other things, though formerly staunch privacy advocates, the makers discontinued development of TrueCrypt and recommended something like Microsoft Bitlocker, which no one with any sense believes could be NSA – hostile. It then became logically defensible, since NSA was not complaining about PGP or other encryption programs, to posit they had already been vitiated.

This is the situation we have: all of the main are important encryption programs are compromised at least in use against the federal government. Whether NSA tools are made available to local law enforcement is not known. This all begs the question:

Does the public now have *any* encryption that works? Even if we can see the source code of the encryption algorithm the source code of the program employing that algorithm must be considered false. (TrueCrypt was the only program NSA complained about.) In the case of other software, it becomes believable the NSA has allowed to be published only source code that hides their changes, and the only way around that may be to check and compile the published code yourself. Half the public probably doesn't bother.

Okay, Slashdot, what do you think? Where do we stand? And what ought we to do about it?

Comment Buy a Kinesis instead (Score 1) 82

1. "All the Keyboards" didn't apparently include a Kinesis. At least there isn't one visible amongst the few photos linked.

2. The new keyboard looks an awful lot like a Kinesis.

3. I stopped watching the video after the first 10 seconds because it was too awful.

4. The web site shows a keyboard with what appears to be a metal case, and the text references aluminum, as does the blog. Wood isn't part of the equation here. Maybe in the early prototypes, but not in the production models, apparently.

5. Any decent keyboard driver (and there are lots of aftermarket add-ons) support macro definitions. Nice that this new keyboard supports it, but certainly not a defining characteristic.

6. Just go buy a Kinesis. It's been in production for a long time, and they work great.

Comment Re:Sometimes I am jealous (Score 1) 219

No. That was point:
2) Sometimes the guy at the top doesn't have the best interests of the country in mind, and nobody can make him.

If you want to call that corruption you can. In my mind it merely includes corruption.

FWIW, I don't think that power corrupts, rather it's lack of consequences. This is closely related, but not the same. But it's also true that power attracts the corruptible (as a gradient). Different people are corruptible in different ways and to different degrees. And one consequence of that is that they are attracted in differing amounts to different kinds of power. The guy who's attracted to being a policeman isn't the same as the guy who's attracted to being a politician, and neither is the same as the guy attracted to being a banker.

P.S.: Yes, that's still an oversimplification. Think of it as a finger pointing at the moon. Look at the moon, not the finger.

Comment Re:Godwin and wrong at the same time (Score 0) 109

Some did and some did not. It is unfair to judge the individuals of a nation by the actions of other individuals. None of us know what we would do in the same situation. We all know what we would like to say we do but that is not the same thing.
Of the nations of Europe that had to live under the occupation Norway probably has the best record for resistance. Frankly the Germans didn't treat the Norwegians badly at all. They thought of them as fellow Nordics. They could have sat out the war with little grief but instead they tied down massive numbers of German troops. That being said sitting at your computer and making accusations is not helpful in the least.

Comment Re:EVD (Score 1) 170

It's exactly as many syllables as "ebola" but carries more information, what's not to like?

Indeed, it carries MUCH more precision than just "Ebola", which can mean any of the following:

"Ebola River" is a tributary to the Congo River.

"Ebola Hemorrhagic Fever" was the name of a disease first discovered in people living in the remote Ebola River watershed.

"Ebola Virus" (abbrev. "EBOV") is the infectious agent that causes "Ebola Hemorrhagic Fever"

"Ebolavirus" is the taxonomic genus to which the "Ebola virus" belongs.

"Ebola Virus Disease (abbrev. "EVD") is now the more common name for Ebola Hemorrhagic Fever. We can call it that because we have definitively identified the infectious agent that causes the disease (EBOV). Changing the name pre-emptively differentiates EVD from other hemorrhagic diseases that might arise from the same area.

Laymen simply say "Ebola" and let their audience sort out what they mean -- if indeed they mean anything precisely. I once had this conversation with an elderly relative.

Relative: 90% of bats have rabies.

Me: That's hard to believe.

Relative: It's true! I read it in the paper.

So I went to the paper and found out that she had it hopelessly garbled. TEN percent of bats SUBMITTED FOR TESTING had positive SCREENING tests.

Comment Re:STEM is the new liberal arts degree (Score 1) 174

theyre' all hot-shot python hackers but have no idea what the difference between a linked list and an array list is.

Actually I think this is precisely what a lot of non-STEM employers are looking for. When they say they want a computer programmer, what they mean is they want someone who can be the local Excel-macro whiz.

Comment Re:~50% have no degree... (Score 1) 174

Real knowledge is in books and I hope people do not require a degree to read.

I think that's actually a big part of what many self-taught programmers are missing. It's not the lack of a degree that's the big problem, but the lack of having read any of the things that you would read when getting a degree. You could read them on your own, but many people don't.

Comment Re:EVD (Score 1) 170

I worked in public health informatics for many years, and it's a longstanding tradition to use three letter codes. I think this is the legacy of old systems which provided three or four character fields for codes, but it certainly speeds things along when you're keying data into a spreadsheet.

The tradition isn't formalized, and so it's application is somewhat irregular, but it's important in this case to realize that public health surveillance makes a strong distinction between a *disease* (a disorder of structure or function in an organism like a human) and an *infectious agent* (the parasite, bacterium, virus or prion that transmits the disease). That's because you can find the infectious agent without finding any cases of the disease -- for example in an asymptomatic human, in a disease carrying vector like a mosquito etc. Non-specialist use the same terms to refer to either the disease or the agent (this naming by association is called "metonymy", a word every system designer should be familiar with). So of course the abbreviations experts use seem nonsensical to non-specialists.

The abbreviation "EVD" maskes perfect sense -- it is the *disease* caused by the Ebola Virus (EBOV). A non-specialist uses terms loosely and would say things like "They found Ebloa in Freetown." A specialist wouldn't use such loose language. He'd say "We found a human case of EVD in Freetown," or "We had a serum with a positive titer for EBOV from Freetown."

Comment Re:Risk of mutation to something worse? (Score 1) 170

Well incubation period is somewhat different. Also an issue, but not the same one as asymptomatic carriers. Some viruses have completely asymptomatic carriers, who can harbor it for years without themselves being significantly affected, which makes long-distance spread a lot easier. Ebola doesn't seem to have that.

Although Ebola does have a reservoir in rats, who carry it asymptomatically. No idea what the odds of it spreading via that route are.

Slashdot Top Deals

"Ada is the work of an architect, not a computer scientist." - Jean Icbiah, inventor of Ada, weenie

Working...