Comment Re:Mission accomplished (Score 1) 99
Now that they have made all their software trustworthy there is no more need for the group, right? Declare victory and go home.
That's what they did when IE6 won the browser war!
Now that they have made all their software trustworthy there is no more need for the group, right? Declare victory and go home.
That's what they did when IE6 won the browser war!
Hey, look: a bell curve!
Well, except for the bump at "100 bpm or greater". I didn't realize so many squirrels read slashdot.
It has a decent UI
Really? Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. Yeah, it was a while ago and some things have improved, but most of the issues remain and I doubt another focus group study would find significantly different results.
The problem is that designing a UI that makes it easy for people who don't know anything about cryptography or security to achieve useful cryptographic security is really, really hard. Almost as hard as educating everyone about cryptography and security enough that they can achieve useful cryptographic security with PGP.
If this technology matures to the point that it's stable on every desktop OS, then the OS is reduced is reduced to simply being a platform
Java did that years ago. Notice how it destroyed Microsoft?
Those other nations are more than welcome to turn the tables or create their own rules.
Try Fastenal. Generally cheaper and a much, much bigger selection. Hours can be a little inconvenient however.
Android security team, eh? Are you the guy who thinks that my phone implicitly trusting the Chinese government, Turktrust, et al is perfectly reasonable, while at the same that constantly complaining about my own personally verified CA is "WorkingAsIntended"?
No.
Still seems more "cute" than "cool".
It's actually really convenient. You'd have to try it to see just how smooth it is. Much easier than the "share" button.
I know everybody talks about encryption, but the word itself is just the tip of security. What's the key size? What's the algorithm?
It uses Linux dm_crypt. Here's the source code that configures it, and protects the dm_crypt master key: https://android.googlesource.c...
What data is encrpyted?
The
Most of the rest of your post is speculation assuming that Google is intensively mining everything backed up. I'm quite certain that's not true, but I probably shouldn't comment in more detail.
The only thing it will do is keep your private information out of the hands of someone who picked up your lost phone and decided to keep it (or sell it).
Yes, that's what device encryption is for.
(Disclaimer: I'm an Android security engineer. I'm speaking for myself, not for Google.)
With your bare hands?!?