Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:They didn't know he also... (Score 2) 403

"You agree to indemnify and hold Yahoo! and its subsidiaries, affiliates, officers, agents, co-branders and other partners, and employees, harmless from any claim or demand, including reasonable attorneys' fees, made by any third party due to or arising out of Content you submit, post to or transmit through the Services, your use of the Services, your connection to the Services, your violation of the TOS, or your violation of any rights of another." - http://info.yahoo.com/legal/uk/yahoo/utos/en-gb/details.html Or, to put it another way, no they don't.

Submission + - GNUstep Kickstarter Campaign Launched (kickstarter.com)

borgheron writes: The maintainer of GNUstep has launched a kickstarter campaign to get the time to make GNUstep more complete and get it's APIs up to at least a Mac OS 10.6 level of compatibility. This will allow applications for Mac OS X to run on Linux with a simple recompile using new tools developed by the GNUstep team to directly build from xcodeproj project files. If the kickstarter project is funded beyond it's $50,000 goal, it's possible that WebKit and Darling might also be completed allowing applications built on Mac OS X to run without the need for a recompile... think WINE-like functionality for Mac OS X applications on other platforms... including Windows, Linux, BSD, etc.

Comment Re:Enterprises Will Like This! (Score 3, Funny) 249

Then, at some point in the future, Mozilla will run a campaign explaining that 10% of the interwebs is on Firefox 11 ESR, but there have been loads of new features and enhancements since then so we should all tell people to upgrade to Firefox 17. Friends don't let friends use IE 6^W^WFF 11.

Comment Re:Very broken system (Score 2) 212

Simple:

  • Each card and ATM is given a public/private key pair.
  • The public keys are signed by the bank's private key
  • Every card also contains the bank's public key

When the card is inserted, the ATM asks for the card's public key

  1. The ATM then verifies that the card's public key was signed by the bank, using the bank's public key.
  2. The ATM then encrypts a block of random data with the card's public key, and asks the card to decrypt it.
  3. If the card successfully replies with the same random data, it has just proven that it has the private key that it claims to have

Then it's the card's turn to repeat the same process:

  1. It asks the ATM for its public key, verifies that it was signed by the bank, using the bank's public key.
  2. The card encrypts a block of data with the ATM's public key, asks the ATM to decrypt it

At this point, both the card and the ATM know that they are talking to the appropriate device. Each device can then generate a symmetrical key for that session, and encrypt it with the other device's public key, and use those keys for any further communication.

Comment Anonymous Proxy (Score 2) 200

Couldn't these Australian Journalists use an American as an anonymous proxy of sorts? That is, when you find a good source of information, tell him/her to reveal the information to an American, and then use that person as your source. You can then freely name your source, but that source can't be compelled by the Australian courts to name the original source.

Every problem can be solved by adding a layer of indirection ... or beer :)

Submission + - If Crypto is outlawed: confidentiality gone?

frog51 writes: "In certain jurisdictions, use of cryptography by the private sector is limited: e.g. there are reports that in the UAE and other countries not all of the encryption capabilities of the BlackBerry are permitted.

This removes a mainstay of current IT confidentiality. Are there workarounds in place? Or does this potentially break a major modern assumption — that we can secure information wherever we are?

In the 1990s the U.S. government tried to force the use of SkipJack, an encryption mechanism that would have led to all private sector encryption keys being escrowed. That escrow would have been a major target for espionage and terrorism. The US learned from this mistake, but are other regions doomed to repeat it?"

Slashdot Top Deals

"Protozoa are small, and bacteria are small, but viruses are smaller than the both put together."

Working...