Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:Push polling is a sign of fear (Score 1) 658

Exactly how is this story pushing that agenda? It's pointing out that more respondents to the poll view him unfavorably than do favorably. Nowhere does it imply that he has no support.

However, it does NOT state that 33% voted "Snowden did the right thing." It merely shows that 33% of the respondents to the poll viewed him favorably, and it's quite a stretch to infer that they think he did the right thing from that response.

Comment Re:Push polling is a sign of fear (Score 1) 658

How exactly is the poll in this story a push poll? It makes a neutral summary of the issue, and then asks for an opinion if the respondent has one.

Edward Snowden, a former CIA employee, made the news recently for leaking information of government surveillance on Americans, including monitoring internet usage and phone records, to the press. What is your opinion on Snowden, if any?

Comment Re:People do take an interest (Score 1) 393

I guess my point is that it's vulnerable. MiTM is particularly bothersome for anything that doesn't require a physical exchange of OTPs. As for keeping up the MiTM attack, you really only have to keep it up until your purpose is achieved and you no longer care about the attack being discovered. For long-term surveillance this is a problem, but if you're looking to swipe some confidential time-sensitive information, this should be fairly trivial.

Comment Re:People do take an interest (Score 1) 393

So, you're suggesting that a viable end-to-end encryption system for email should require the use of voice authorization?

I'm well aware of PKI and asymmetric key crypto. As for reading up on it:

Another potential security vulnerability in using asymmetric keys is the possibility of a "man-in-the-middle" attack, in which the communication of public keys is intercepted by a third party (the "man in the middle") and then modified to provide different public keys instead. Encrypted messages and responses must also be intercepted, decrypted, and re-encrypted by the attacker using the correct public keys for different communication segments, in all instances, so as to avoid suspicion. This attack may seem to be difficult to implement in practice, but it is not impossible when using insecure media (e.g. public networks, such as the Internet or wireless forms of communications) – for example, a malicious staff member at Alice or Bob's Internet Service Provider (ISP) might find it quite easy to carry out. In the earlier postal analogy, Alice would have to have a way to make sure that the lock on the returned packet really belongs to Bob before she removes her lock and sends the packet back. Otherwise, the lock could have been put on the packet by a corrupt postal worker pretending to be Bob, so as to fool Alice.

One approach to prevent such attacks involves the use of a certificate authority, a trusted third party responsible for verifying the identity of a user of the system. This authority issues a tamper-resistant, non-spoofable digital certificate for the participants. Such certificates are signed data blocks stating that this public key belongs to that person, company, or other entity. This approach also has its weaknesses – for example, the certificate authority issuing the certificate must be trusted to have properly checked the identity of the key-holder, must ensure the correctness of the public key when it issues a certificate, and must have made arrangements with all participants to check all their certificates before protected communications can begin. Web browsers, for instance, are supplied with a long list of "self-signed identity certificates" from PKI providers – these are used to check the bona fides of the certificate authority and then, in a second step, the certificates of potential communicators. An attacker who could subvert any single one of those certificate authorities into issuing a certificate for a bogus public key could then mount a "man-in-the-middle" attack as easily as if the certificate scheme were not used at all. Despite its theoretical and potential problems, this approach is widely used. Examples include SSL and its successor, TLS, which are commonly used to provide security for web browsers, for example, so that they might be used to securely send credit card details to an online store.

Wait, what's that? You're still susceptible to MITM when using CA's?

Comment Re:People do take an interest (Score 1) 393

From RFC 2240:

1. The sender creates a message.
2. The sending software generates a hash code of the message.
3. The sending software generates a signature from the hash code using the sender's private key.
4. The binary signature is attached to the message.
5. The receiving software keeps a copy of the message signature.
6. The receiving software generates a new hash code for the received message and verifies it using the message's signature. If the verification is successful, the message is accepted as authentic.

This still seems susceptible to an MITM attack.

Comment Yeah! (Score 1) 258

Also, we need keys for 'sh', 'ch', 'gh', 'ing', 'ion', 'tion', 'etc', etc. This could become unwieldly, so we should probably just adopt a system of characters that covers all of the possible phonetic variations. To save time, we could have multiple characters for the same sound, which would imply certain meanings based on context.

We'd probably end up with thousands of different characters; hopefully the people who make most of our components would be able to adapt.

Comment Re:Obligatory (Score 1) 176

Shouldn't be long; the story is /.'d, but I assume they're filling the Altavista servers with hot grits like liquid glass in a clunker.

Imagine a Beowulf cluster of those running Linux, all naked and petrified, just like Natalie Portman.

Comment Re:Wrong by law (Score 1) 601

The comment I responded to went like this:

He is merely wrong by law, not by morality. ...Being an independent thinker, I side with morality, and therefore he is a hero.

I was merely pointing out that his morality is not above question, and the conclusion that 'therefore he is a hero' is likewise flawed.

Slashdot Top Deals

For God's sake, stop researching for a while and begin to think!

Working...