Comment Re:Edit check (Score 1) 45
I stand corrected.
Thanks.
I stand corrected.
Thanks.
Thanks. Good point worth reiterating. It was a management decision to design it like that.
Bruce Schneier wrote about that issue a few times in reference to the Predator design, noting that security is a cost/benefit equation.
Thanks for the helpful comments.
I think everyone outside of the NSA wanted a longer key length than 56-bits.
But the main comment from the book was that the DEA withstood the test of time, aside from hardware catching up to it and making exhaustive key attack quite practical.
::: Why do you think we created Triple-DES?
Because 56-bit DES was indeed weak. But aside from an exhaustive key attack as noted; do you know of any DES flaws? It seems like there are none.
Let me check that out and see if that is indeed the case.
Excellent points.
When it comes to targeted advertising and big data analytics, seems like security will always get the short shrift.
I agree with you.
The issue thought is that these ‘purpose designed networks’ can at limited times, be created with a small set of requirements (purposes).
But in large e-commerce settings, with multiple suppliers, inputs, etc., the purpose expands significantly, with complexity that quickly becomes unmanageable; and quickly insecure.
Interesting point.
But that is the same admonition was used when the first ‘Hacking Exposed’ book came out. Which is similar to the argument that terrorists will use strong encryption.
Ultimately, it simply makes it that the white hats should read these books more of an imperative.
Full list of the series here:
Ok, thanks.
Who would you suggest is the greatest one?
Old programmers never die, they just hit account block limit.