Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Submission + - Councilman/Open Source Developer submits Open Source bill (gothamgazette.com)

NewYorkCountryLawyer writes: New York City Council Member Ben Kallos (KallosEsq), who also happens to be a Free and Open Source Software (FOSS) developer, just introduced legislation to mandate a government preference for FOSS and creating a Civic Commons website to facilitate collaborative purchasing of software. He argues that NYC could save millions of dollars with the Free and Open Source Software Preferences Act 2014, pointing out that the city currently has a $67 million Microsoft ELA. Kallos said: "It is time for government to modernize and start appreciating the same cost savings as everyone else."

Comment A little late, but welcome (Score 1) 136

A cynic might argue that the key difference in this case was that, for a change, the ISP's, and not merely defendants, were challenging the subpoenas; but of course we all know that justice is 'blind'.

An ingrate might bemoan the Court's failure to address the key underlying fallacy in the "John Doe" cases, that because someone pays the bill for an internet account that automatically makes them a copyright infringer; but who's complaining over that slight omission?

A malcontent like myself might be a little unhappy that it took the courts ten (10) years to finally come to grips with the personal jurisdiction issue, which would have been obvious to 9 out of 10 second year law students from the get go, and I personally have been pointing it out and writing about it since 2005; but at least they finally did get there.

And a philosopher might wonder how much suffering might have been spared had the courts followed the law back in 2004 when the John Doe madness started; but of course I'm a lawyer, not a philosopher. :)

Bottom line, though: this is a good thing, a very good thing. Ten (10) years late in coming, but good nonetheless. - R.B. )
The Courts

FCC Orders Comcast To Stop Labeling Equipment Rental a Service Fee 97

An anonymous reader writes "The FCC denied an appeal by Comcast, which argued that its practice of charging customers separately for a DTA (digital terminal adapter) -- a converter box that allows cable subscribers with older televisions to receive digital channels, which the company said would be provided at no charge -- is not subject to rate regulation, because it is a service fee. The ruling was issued on March 19." Also from the article: "In an e-mail last week to the Star Tribune, Comcast vice president of corporate affairs Mary Beth Schubert said the case “involved a relatively minor dispute about the way certain items are presented on the rate card but has no effect on overall pricing.” But, [Michael Bradley, an attorney whose firm represented Minneapolis-area franchising authorities in the dispute] argued the FCC’s decision sets a strong precedent for transparency within the cable industry."

Comment Re:FIPS 140-2 4.9.2. The Other Back Door. (Score 1) 168

> 2^128 - 2^112 [...] it's significant, especially if you have a huge data center in Utah.

But 2^128/2^112=2^16=65536

As an upper limit, assume that you remove 100*2^112. But that will still only eliminate 100/65536=0.1% of the search space. Any key that is brute-forceable by NSA with those 0.1% removed is also brute-forceable without those 0.1% of the search space removed.

> What may be worse (I don't know) is the simultaneous equations that it creates that are invariant for keys from such a source. Maybe they could be used in a cryptographic attack to help solve the sorts of attack that try to build big systems of simultaneous equations to attack the key schedule.

Something like this seems slightly more likely. But assuming the bits were perfectly random before the removal of repeated blocks, for finite keys it still doesn't generate anything that couldn't have been generated by chance without the removal of repeated blocks.

Comment Re:FIPS 140-2 4.9.2. The Other Back Door. (Score 1) 168

I agree that the output is not random by the standard definition. And obviously a bad RNG.

But making a practical attack based on that seems unlikely to me.

> For the record, RdRand doesn't do this because I refused to put it in because it's a back door in the spec.

Wait what - you designed Intel's RdRand hardware RNG?

So, since there is a lot of paranoia about backdoors in that, is there a backdoor? :P

Comment Re:Huh? (Score 1) 243

> And what if there is a hash collision?

Cryptographical hashes are designed to make that ridiculously unlikely. Go play buy a single ticket to the national lottery instead - you are far more likely to win the biggest price there than to every find a hash collision.

Comment Re:On the record (Score 1) 99

I freely admit that I assume they are guilty because of 1) all the damning evidence 2) their refusal to defend themselves.

And I submit that all reasonable persons should assume they are guilty for the same reasons. Assuming they are not guilty would be incredibly stupid.

Comment Re:On the record (Score 2) 99

For starters, they can come clean. All their press releases have been exercises in trying to say as little as possible, and be as misleading as possible whiile still not literally lying. For example, their non-denial of the $10,000,000 deal with NSA had half the press falsely reporting that RSA claimed there never any $10,000,000 deal.

Dual_EC_DRBG has been documented since 2006/2007 to be an insecure CSPRNG, even without the backdoor. I knew about it for example, and I do not even work in that field. The only way nobody at RSA Security (a huge company specializing in security) could not have heard about it is by putting their hands over their ears and yelling LALALA. And they didn't put 2 and 2 together about why NSA paid them $10,000,000 when the possible backdoor was discussed in the media and the cryptographic community?

I can accept that RSA Security might have been fooled in 2004. But they have not even tried to explain why they kept using Dual_EC_DRBG after 2006/2007. They have been caught with the hand in the cookie jar, and refuse to even try to defend themselves. Why should I try to invent explanations for their innocence for them?

> what evidence could RSA show us that would reinstate our trust

The point is that the circumstantial evidence is so hugely strong. This is not unfair - this is reality.

It is like finding you standing over a corpse in a pool of blood and a knife in your hand, with a $10 million payment to your account from the victims worst enemy. And you refusing to talk about how you got there, or why the victim's worst enemy sent you the $10 million. Do you think I have no right to make assumptions in that case?

Comment Re:What did you expect? (Score 1) 99

> What RSA Security has specifically said is that they knew about the backdoor when they made the $10,000,000 deal.

That should of course have been:

> What RSA Security has specifically said is that they didn't know about the backdoor when they made the $10,000,000 deal.

Comment Re:What did you expect? (Score 1) 99

> And the RSA did go on record. They said it wasn't true.

What RSA Security has specifically said is that they knew about the backdoor when they made the $10,000,000 deal. RSA Security has not denied that it turned out there was a backdoor, or that there was a $10,000,000 deal to make Dual_EC_DRBG the default in the BSAFE library.

If you read the keynote from the current RSA Conference, RSA's defense is that they stopped independently creating and verifying the cryptographical algorithms, instead just getting them straight from NIST and ANSI. And they knew or should have known that Dual_EC_DRBG was written by NSA.

> "Recognizing that [after year 2000, open source, non-patented encryption was widely available], and encryption's inevitable shrinking contribution to out business, we worked to establish an approch to standards setting that was based on the input of the larger community rather than the intellectual property of any one vendor. We put our weight and trust behind a number of standards bodies - ANSI X9 and yes, the National Institute of Standards and technology (NIST). We saw our new role, not as the driver, but as a contributor to and beneficiary of open standards that would be stronger due to the input of the larger community."

Meanwhile RSA Security ignored all the independent research showing that Dual_EC_DRBG was radioactive. So RSA Security's defense is that they stopped doing any due diligence, and instead just copied everything straight from NSA. And because they stopped even trying to do independent cryptography, they were not aware of the possible backdoor. And you think RSA Security's statements in their defense are not laughable, and that people protesting this is just "a$$holes"?

Slashdot Top Deals

The Macintosh is Xerox technology at its best.

Working...