Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:Sacre bleu! (Score 4, Informative) 75

Having been to some ISO meetings recently, I can state without fear of being wrong, that ISO leaves itself wide open to corruption. There is a process, but it is nothing like a normal standards process with the usual mitigation to prevent domination by a single body and a convergent consensus process to get to an agreeable document in a reasonable time.

Participants don't even get access to the documents they are working on. They have to buy themselves copies in uneditable PDFs. The result is that people keep adding crap into specs that already exists in other specs, but no one knows to reference it. So these things become inconsistent over time.

You will find function specifications handled in one group and test & validation specifications for the same thing in a different group. So the function specification gets no consideration of testability requirements and the test & validation group don't get to specify that the thing be testable, only how it may be tested after it's been implemented to the spec that has no testability requirements in it.

ISO is not a competent organisation to write specs. Certainly not technical computer software and hardware specifications. Maybe they're OK at bridge loading specs, or non-stick coatings. I don't know.

Comment Re:So the work begins again (Score 1) 64

To find out where the NSA put the twist.

Well P-224 isn't twist secure, if that's what you're hinting at.

In reality the backdoor isn't in SP800-90A, B or C. It's in FIPS 140-2 section 4.9.2. In a FIPS certified module, that procedure applies to all RNG outputs 16 bits and above. A test that changes the data to create a stream of known algebraic inequalities. Genius.

Comment Re:Why should we trust NIST encryption? (Score 1) 64

NIST recklessly broke our trust in them by allowing known to be broken encryption into their standard. Their new document may come with all the best intentions, but it will take years to rebuild that trust. Let's wait for what the crypto community has to say about these documents, before we blindly follow their latest standards.

Well you could go with the ANSI or ISO RNG specs.

Oh wait, they're written by the same people.

Comment Re:de SEC suitz hunt0rin haxx0rz nao (Score 1) 20

Queue up the internet insider trading frame up scenario.

#1 Hack A, a competitor to B, finding that A will do X.
#2 Hack B, leaving hints that it was A that did it.
#3 Leak to gullible idiot in B that A is doing X.
#4 Trade on X happening.
#5 gullible idiot trades on X happening.
#7 Trade on B being found out by the SEC
#6 SEC throws gullible idiot to the dogs.
#7 Profit!

Comment Re:TNSTAAFL (Score 1) 272

... the net neutrality regulations ARE NOT a government takeover of the running operations of telecoms.

True, but that's not the same thing as saying net neutrality rules don't affect cost structures for telecoms.

Selling an unlimited service and then limiting it is fraud. People should go to jail for that. Requiring vendors to tell the truth about their product and adhere to their product claims in not an unreasonable intrusion into their cost structures.

Comment Re:So, I had a thought about this a while back (Score 2) 126

It boils down to "why not pre-compile entire websites into binary packages per-page? It would make it much faster and more efficient for the browser to load it..."

http://developers.slashdot.org...

Or we could write programs, compile them and let users run them on their computer.

Slashdot Top Deals

UNIX was not designed to stop you from doing stupid things, because that would also stop you from doing clever things. -- Doug Gwyn

Working...