Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Distress Keys and Images (Score 3, Interesting) 500

Some crypto junkies talk about distress keys. Where a user can enter two different keys depending on the situation. The real key loads the real OS. The distress key loads the "fake" OS. There are many ways to detect this in modern experiments. None will work without manipulating low level HD blocking.

Comment Re:P2P and Revered Connections (Score 1) 307

You make an interesting point. The idea of a secure P2P private networks still doesn't sit well with me. The insider threat can still act as the attacker and remove data from their assigned facility. None the less, business requirements "are" business requirements. "Its not the technology that's the problem", its how easy it is to abuse.

Comment Great, why don't we just give them our laptops! (Score 1) 236

So, the idea was to load "sleeper" software by default on all these machines? Is the URL associated with this "service" always at the same memory location? It shouldn't be that hard for a Malware author to check for this BIOS and try to change the address. Who feels like being monitored by criminals? 10% off sale price?

Comment Re:Binary Encoded Messages (Score 1) 254

Maybe, maybe not. When was the last time you hear a telecommunications company update their software within a reasonable time frame? It would just be easier and cheaper for the phones to get updated. So the phone manufactures will blame the telcoms while the telcoms will blame the manufactures. I can see where this is going...

Comment Re:P2P and Revered Connections (Score 1) 307

I do not consider wire transfer services such as SWIFT a P2P technology. I wouldn't call a network of Morse code operators using telegraph lines P2P either. Getting into a semantic discussion won't solve anything though. If one were to distinguish PUBLIC P2P v. PRIVATE P2P I would say neither are secure. An internal P2P network could be easily exploited by a rouge insider. Simply stated, the government and military contractors should proactively block all P2P traffic or risk heavy fines and potential termination of employment or funding.

Slashdot Top Deals

With your bare hands?!?

Working...