Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Actually, ADM Rogers doesn't "want" that at all (Score 1) 406

If companies want to take the direction of removing themselves from the encryption picture altogether, that is their prerogative.

And yet that is precisely what the government is pissing and moaning and setting its hair on fire about. Showing that sort of contempt for citizens' private prerogatives is what caused them to forfeit our trust in the first place.

Comment Re:If they break into people's homes.... (Score 1) 392

That's another advantage of forcing the snoops back to "direct access" methods -- every so often one of them will get caught red-handed snooping on the wrong (i.e. clearly innocent and rich/influential) target, re-focusing attention on them and forcing another round of retrenchment until it blows over.

Comment Re:Cost/benefit ratio (Score 1) 392

Now, if a backdoor is found by the bad guys, it will be used almost immediately to destroy a company.

If it's found by really bad guys (e.g. North Korea on a day when Dear Supreme Grand High Panjandrum is feeling especially trollish), it can be publicly circulated to destroy every company.

Comment Re:And is this a bad thing? (Score 5, Insightful) 392

Forcing them to switch to "direct access" methods puts pressure on them to follow the law. First, as I noted in my earlier comment, the non-scaling time and manpower costs (each tail, bug, etc requires significant additional resources) forces careful selection of targets. Second, "direct access" methods put the snoops at a nontrivial risk of getting caught and/or leaving recoverable evidence each time they use them illegally.

Comment That's Exactly What They SHOULD Be Doing (Score 2) 392

"Direct access" methods (tailing people, planting surveillance devices, etc) do not scale anywhere near as easily as network surveillance -- each "direct access" target requires a significant fixed cost in resources and manpower. This imposes discipline on the snoops and forces them to pick and choose actual suspects instead of trying to scoop up everything.

Submission + - Indiana Court Rules Melted Down Hard Drive Not Destruction of Evidence (freezenet.ca) 1

An anonymous reader writes: An Indiana court has ruled that a hard drive that was sent to recycling was not destruction of evidence. The ruling stems from a BitTorrent file-sharing case filed by Malibu Media where a defendant claimed that his hard drive had failed thanks to heavy use. Malibu claimed that the act was destruction of evidence and filed a motion demanding a default judgement. The court denied this motion suggesting that because the hard drive failed, there was no evidence to destroy in the first place.

Comment Cooperative Game... With Possible Exceptions (Score 1) 155

That's one advantage of mostly cooperative board games where there might be a hidden "traitor" among the players who wins if the group loses (e.g. Shadows Over Camelot, Battlestar Galactica). With that possibility on the table, players can't just trust somebody else to make decisions and have to pay attention to what everyone else is doing (usually in these games, exposing the traitor has some reward, at least insofar as it curtails his ability to continue undermining the group).

Comment Re:It's a TRAP! (Score 2) 175

webmail kinda implies that the provider will either be storing the key or at the very least be able to access it

Obviously they need access to the PUBLIC keys in order to encrypt messages to the designated recipient. The whole point of public-key cryptography is that revealing the public key doesn't compromise security.

Slashdot Top Deals

Any circuit design must contain at least one part which is obsolete, two parts which are unobtainable, and three parts which are still under development.

Working...