Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:100 lines is meaningless (Score 4, Interesting) 140

I read through the implementation presented and the additional ~200 lines of code for each of the authentication (poly1305) and encryption (chacha.c) pieces of this protocol. Coming from the perspective of an experienced coder but relative crypto novice this just looks like a very sophisticated shifting algorithm (like ROT13, on steroids) keyed on the TCP sequence number. Is this considered acceptable security for a data stream? I'm honestly curious, I haven't played around with crypto functions very much.

Comment Re:My goodness (Score 1) 417

My understanding of the fifth is that it only applies to information that can't be collected under a warrant.

For example, if you have a lockbox with incriminating documentation, and the police can provide sufficient evidence for a warrant, you can be required to unlock the box. However, you can still plead the fifth if a lawyer is asking about your "intentions" for the contents of the incriminating box.

So I think there is a valid question of whether the FBI had the right to force the lock on "the box" of encryption if they didn't have a warrant already. That's like the police breaking and entering to seize evidence; it would be thrown out in court because it wasn't collected properly.

They have to have evidence of a crime before they can get a warrant. But once they have a warrant, they have the right to open "the box" of encryption.

I believe that also means they have the right to demand the keys to the box: your passwords.

IANAL, but this is nearer the truth than other comments earlier in the thread, I think.

Having read not just THIS article, but others about Feldman's case, I learned that the prosecution has found, on Feldman's personal computer, unencrypted indexes of file names that are present on the encrypted drives. Many of these files have explicit names about the subject matter contained within, giving them reasonable suspicion that these files actually contain depictions of underage children engaging in sexual activity.

Because the prosecution has this list of file names on the encrypted drives, Judge Callahan determined that Feldman's 5th amendment right no longer applied, as he would not be incriminating himself -- they know what is on the drives, they just need to have them unencrypted to enter them as evidence.

Make no mistake, this man is being accused of perversions that, if true, deserve prosecution to the full extent of the law. However, that does not give the government of this country or any country free reign to ignore his rights as a citizen and as a human being. I am in one sense extremely glad to see the judicial process being carefully applied, so that the accused is properly and legally convicted, and does not get off on a technicality. In another sense, I am also watching this with much trepidation, as precedents set too hastily could erode another one of our rights.

I believe, having read the motions presented in court that are publicly available, that in this case, because they already have evidence that there are files on the encrypted drives which have pornographic names, referencing the depiction of pre-teens in sexual acts, for instance, then the prosecution is justified in forcing the defendant to decrypt the drives and provide the court with the contents of those files.

If they didn't have the unencrypted index, I would probably have to see more proof to feel comfortable with what they are doing, however.

Comment Re:Why not just block messaging? (Score 2) 511

If the aim is to stop registered sex offenders from messaging, why block them from gaming completely? Just block their ability to message.

Shooting them in the head will stop them from both messaging and gaming. If we're already admitting rapists, pedophiliacs, or exhibitionists are not able to be rehabilitated, why bother even pretending they can live a productive and successful life? Just get rid of them, no one wants them around, obviously. Solves the problem, neat and clean.

Comment Re:Actual Detection of Impared Drivers (Score 1) 608

soccer moms scare me WAY more than drunks or any other intoxicated driver does. the thing is, drunks know they are drunk (usually) and so they at least try to be careful. moms, otoh, think things are perfectly fine even though little johnny is screaming his head off in the back seat and slapping his sister suzie. each time the mom turns around to scold the kids, she takes her eye off the road.

I seriously fear the soccer moms more than any chemically enhanced driver.

No joke, I saw a m0m in a minivan turning around to READ A BOOK to her kid in the back seat, while driving on the freeway. You're completely right, it's the everyday unsafe drivers that worry me just as much as or more than the ones that are under the influence of something.

Comment Re:is it real (Score 1) 1198

I am skeptical that physical assaults on anyone, including citizens of another country, are legal in France. Maybe they do things differently over there, I really don't know, but finding the proper authority shouldn't result in being ignored when reporting an assault. Maybe he just hasn't contacted the right people yet.

I also understand it's probably a real pain in the ass to pursue this legally due to the short time one spends in a country on vacation, usually, so what might be more helpful is if someone could point the guy to the right person to talk to.

It's probably a complete waste of time to talk to McDonald's, though.

Comment Re:Issue for me is pattern recognition. (Score 2) 204

I can totally relate to this. I have to sleep with a fan or some other true white noise in the background. HAVE to. Absolutely have to.

My (ex-)wife bought or was given this noise generator thingy because we had problems sleeping with snoring and TV and such, and when I say "we" I mean that I had a problem sleeping, and she had a problem not turning off the TV when it was time to go to sleep. Anyway, it had a bunch of audio modes to pick from: birds, happy burbling river noise, jungle, crickets, a few others, and a white noise track. Well, the track for each was, as you said, just long enough that I could pick out the patterns, and as we listened to them to try to pick one, I was saying "no" to each one rather quickly, and she was getting more and more frustrated. Finally I said, "just try the white noise one, I don't care if it's boring, it's the only one that's going to work." Rather soon (almost immediately) I realized the track for the white noise was simply an 8 second loop and the "whiteness" JUST barely didn't match up from the end and the beginning so I could hear this tiny clip in the audio when it looped. "NOPE THIS ONE WON'T WORK EITHER" in fact, it was by far the MOST annoying one of the bunch. She never understood why, and it got returned or thrown out or donated or whatever.

But yeah.

Patterns.

They suck sometimes.

Comment Re:"does some spying and reporting on you" (Score 1) 635

This is even simpler. Have your software display a large, easily readable banner to the user, that says "use of this software implies you have a license blah blah" (have your legal department replace all, including "blahs," with proper legal terminology.) Then, you've already stated you know some non-paying "customers" are using it, so go after them with said legal department, make them paying customers one way or the other.

Slashdot Top Deals

Old programmers never die, they just hit account block limit.

Working...