Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Um, (Score 1) 112

Yes. Because some people think that TrueCrypt was killed BECAUSE it was actually secure and the NSA wanted them to de-secure it.

As such, a warrant would let people continue to use it, secure in the fact that it actually works as required.

It also lets people fork it.

Frankly, I have been severely disappointed with BestCrypt, which I had hoped would end up as the replacement for TrueCrypt. (multiple problems with getting the regular operating system to recognize the 'mounted' drives)

Given that the authors were anonymous is it postulated that the NSA hunted them down and was ready to doxx them for not complying? What leverage could they possibly have had?

Comment Re:Um, (Score 4, Interesting) 112

What did the TrueCrypt developers have to do with the audit of TrueCrypt?

Is there a point to continue auditing a platform whose entire developer team has abandoned whilst urging all users to seek other encryption tools? At this point the audit is probably going to be interesting (related to the aforementioned dev abandonment), but not exactly useful... If you are still using Truecrypt, you have already been warned.

Comment Re:WTF? (Score 1) 114

I don't think so. The pubic and private keys are only good for outgoing connections and not incoming.

Not funny. Anyway, having the private key is a valid way to authenticate inbound (if so configured) and its often enabled by default as it is thought to be a pretty good way to do it (until you put the same keys on a quarter of a million devices).

Comment Re:what most people don't think of doing (Score 1) 114

What's this "machine ID" you speak of? The MAC address? It's pretty easy to configure the same MAC on a different machine.

Most people don't think of doing it that way because it's not a good way of doing it.

That part was a little bizarre (if you are physically connected directly from PC to router it doesnt matter much what ID the PC might have) but as a whole it creates a pretty tight way of ensuring integrity of the router configuration. In particular, not allowing any inbound access from the WAN until a hard password is set, and not allowing any association to the WLAN until a hard encryption key/passphrase is set. However, these are two steps most users don't want to bother with (and more importantly, will call tech support to help them with when they fail to complete the tasks). Security, as we have currently designed it, is pretty hard for the layperson. Vendors optimize their devices for the path of least resistance (read: path of least tech support) to minimize costs, and we shouldn't be a bit surprised.

Comment Re:Not the same as root user keys (Score 0) 114

This is the fingerprint, not the root user's key.

They are identified as having the same fingerprint (which is derived from the same source as the private key). So, someone with the private key for one device (ahem, anyone who has a copy of the firmware and knows how to use binutils) can authenticate to all devices.

Comment Re:WTF? (Score 1) 114

Isn't TFS supposed to explain what it's talking about?
1. Why does a router have public-facing SSH? The reason to use SSH on your router is to configure it, over a wired connection from your PC, innit?
2. Why does a router come with SSH keys already installed? Don't you generate your own SSH keys?

Given that they were deployed by one particular provider (Telefónica de España in this case) they probably requested a special firmware from the vendor for their CPE to allow remote management. And then did a bad job of keeping the master key safe (by putting a copy of it on 250,000+ devices). And then the vendor used it elsewhere, too.

Honestly, after the Carna botnet, does anyone think the internet isn't a raging sea of completely compromised devices?

Comment Re:Sweet F A (Score 1) 576

Any race advanced enough to travel here to invade will have capabilities way beyond anything we could hope to combat or detect. I would imagine the first sign you would have would be if you were one of the lucky ones to see half the world wiped out a few seconds before you yourself were removed from this mortal realm.

How bleak. Let's be realistic, if aliens did come and wanted our planet, they would probably enslave some/most of us in the process. I mean what's a conquered planet without a bunch of servants to run it for you?

And considering what we know about FTL travel (that it is really truly impossible) even an alien with super advanced near-light-speed technology would take decades to travel from system to system. In that amount of time, their bitter rage is sure to be tempered by boredom, so when they show up they might feel the need to just chat for a bit. Space gets pretty lonely, you know?

Comment Re:FINALLY (Score 1) 36

I've stored all my past data successfully and archived in a non-magnetic format, with duplicates stored at alternate locations for safety. Now if only I could remember what my encryption password was in 1983...

That's ok, any form of encryption used in 1983 is sure to be mere seconds away from cracking with any modern PC.

Comment FINALLY (Score 4, Funny) 36

Can this be the end to the monthly "Hey guys whats the best way to back up my mp3s and family pics, no i mean really back them up, like for YEARS" on ask slashdot? From now on when one of those submissions gets greenlit, a link to this is going to be the only reply. Are we agreed?

Comment Re:Pick an easy solution (Score 1) 343

I would recommend Google docs, assuming there isn't any crazy formating involved.

#1) It is a single document so you don't have to worry about the naming of it..
#2) Google Docs has a built in ver. control, in that you can roll backwards to early version of the document, and you can see who is editing, changing etc. (assuming everyone has their own password).

It's low tech, easy to use, and the only education is to keep on using the same file name.

The big downside is that the Google Docs UI is dramatically different from Word/Excel/etc. If they need more than just a place to throw text and actual layout work is being done, the users will need to retrain on the Google Docs way of getting things done. It's not impossible, but it's also not easy either.

Comment Re:Business problem != technology problem (Score 2) 343

Throwing more technology on the pile won't help without a lot of user education, and if you had that you would not need the technology anyway...

1) Create a rational naming convention and use that.

Or

2) use Sharepoint's (base version is free beer) built in versioning system. That is what it is designed for and is one of the few things that SP does well.

This. SharePoint does it in a fairly elegant and comprehensive way if you are a Microsoft shop. If you don't want to invest the time into installing/learning SharePoint, just look into Shadow copy or one of the many delete-less for the server, so you can go back in time if changes do get clobbered. For a more user-friendly but less controllable solution, every cloud file storage platform (Onedrive, google drive, dropbox, box, etc) offers this feature in a pretty straightforward way, and they have all have paid team collaboration solutions as well to managed shared files. And if you really want to flip them the fuck out, move to an online doc platform like Office 365 or Google Docs where you can actually do collaborative editing within the documents.

Comment Re:Did they ask if they could look it up? (Score 1) 809

Sure, but the person asking this question never even mentioned if PKI even had anything to do with the position being hired for. All we know is that he pop quizzed them on it and they didn't happen to answer the question as he wanted. If this is for a senior development job for developing encryption software than that is one thing, but if this is just random pop quiz questions than it's as silly as me asking someone questions about ARM Neon for a position writing .NET services.

If you are right then the title should really be "Ask Slashdot: What Portion of Hiring Managers Are Bad At What They Do?"

Comment Re:"Dark Web" (Score 1) 69

Which is it, Deep Web or Darknet?

Excellent reporting there.

TFA explains that it's both:

Memex searches content typically ignored by commercial search engines, such as unstructured data, unlinked content, temporary pages that are removed before commercial search engines can crawl them, and chat forums[...]
Memex also automates the mechanism of crawling the dark, or anonymous, Web where criminals conduct business. These hidden services pages, accessible only through the TOR anonymizing browser, typically operate under the radar of law enforcement selling illicit drugs and other contraband.

Comment Re:"Deep" Web or "Dark" Web? (Score 2) 69

You are right, the "deep web" is not the same thing as the/a "darknet" or "dark web". They don't do a good job of keeping that clear in the headline. From TFA's own citation on wikipedia:

"The deep web should not be confused with the dark Internet, computers that can no longer be reached via the Internet.

However the article does assert that this Memex project is indexing both unpublicized content on the general internet (the deep part) plus anonymized content on Tor and other privacy services (the dark part).

Comment Re:Did they ask if they could look it up? (Score 1) 809

You don't need to hire experts right off the bat. What you want to hire is someone who recognizes that they don't know the answer, and tells you that, and then immediately says they'd go research it to find out. "Can I Google that?" is a perfectly valid answer sometimes. If you hire a person who knows how to learn whatever it is you need them to become an expert in, you'll have a new employee who is not only going to be a valuable asset for where you're hiring them, but also has the flexibility to expand to other areas when necessary.

TL;DR: Stop looking for purple unicorns, and start looking for fast learners.

That all depends on the kind of leadership required of the role. If you are going to be an architect and guiding implementations of public key encryption platforms, you will need a deeper understanding than what a google search will turn up because making something out of shitty advice on the internet will probably turn out pretty shitty (and you won't know the look of shitty advice when you see it). If you just need to be familiar with the concept while you work on something else, then sure "LMGTFY" will pass.

Slashdot Top Deals

Suggest you just sit there and wait till life gets easier.

Working...