Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Dangerous overkill (Score 1) 88

Dangerous because automatic key updates should require a great deal of verification of the new keys. I could imagine some scenarios (e.g. cloned virtual machines), which lead to the authenticated key being correctly updated (e.g old instructions/documentation) by the admin, but the EC key not overwritten (since it's not in the standard procedure). If this EC key then is copied automatically to the client, any of the cloned machines would accepted as a verified server after the login.

Overkill because exposing the public keys in terms of the sftp protocol would be less invasive and give the client full control what to do whith the keys.

Comment Well they are used to facebook. (Score 1) 307

Seems reasonable to me.

Facebook: If you click here, for playing farmville and getting up-to date advertisements around the world and hearing which of your friends prepares pizza right now, you give us all your data. We will sell it or not, as we see fit, ask you about it or not, as we see fit, change the rules at any time, as we see fit, and if you dont disagree immeduatly, we will make an effort to protect our interest by just giving you enough privacy not to run away.

NSA: To stop terrorists killing you all, we need to log all data of you which we can get.

Yes, if you give me the choice if the ratio of loss of privacy to gained comfort/security is better for Facebook or the NSA, i choose the NSA.

Comment Re:Defective by design. (Score 1) 222

Two year ago: Openvpn was fine, but webpages of providers were blocked (not a bad strategy...).

Last year: private Openvpn server worked, but connections dropped after ~1Gbyte was transferred, and well known providers were blocked

This year: openvpn was detected (not sure how!) and private server seems to have ended on some "gray" list, ssh connectionsafter that were very slow (although that could coincide with slow internet); sshing to singapore AWS cloud was fine, but i had the feeling that switching between ports for ssh helped after big data transfers or long conenctions. Connecting by mobile (state telecom) was better than by WLAN.

Blocking seems to happen solely based on target (outside China) IP.

The rationale behind blocking vpns but not ssh is simple: China is not interested in blocking perfectly. They don't care about (or even may like) that you can set up cloud servers which you need for your thing outside China. They dont care about 1% of the population and all foreigners getting unfiltered access to the outside world. As long as they can filter the information for the vast majority. Which implies that the material they mostly care about is video, which means that intentionally slowing ssh still enable you to do your admin work, but you can not copy 1000 youtube videos quickly. Also, for ssh there is no "1-click-vpn" client available......

Comment Only make laws which can be enforced (Score 1) 562

The way out would be that i would have to license and register private keys for encryption. This is dificult to enforce since there is no way to judge if you use unregistered private keys without entering your home and looking at your harddrive.

The result would be that criminals would continue to use it, and that normal people would be criminalized.

Comment You care about the kernel?Incentives to take part? (Score 1) 361

The average tone on the kernel mailing list is not an incentive to participate to an unbiased observer.

If you care about results, dont drive people away. And yes that applies for the whole OS community. Whenever I consider to take part in an OS project, because i find it interesting, i look at the development process/communication and find the tone, way of discussion, and egocentric behaviour inacceptable.

Do you really think i contribute to a project which barely builds in exactly your environment with hundred of obscure dependencies, and when i try to fix it, getting barfed at over the inacceptable choice of standard tool X (yeah, i know, build processes which work out of the box on all linux distributions are *evil*), which seems to be directly from hell?

Do you really think i participate in a discusssion where three dickheads call my approach "SHIT" because they dont like it, without a proper argument, and often referring to episodes which happened 20 years ago as justification?

Do you really think i invest time into projects where the goals are defined by the means, and not vice versa (see the systemd debate)?

I really think i have better things to do with my life.

Slashdot Top Deals

We have a equal opportunity Calculus class -- it's fully integrated.

Working...