Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re: 3des (Score 1) 213

Yes, the key is needed to encrypt, but the encrypted PIN block is already encrypted by the card embosser on behalf of the bank. If the merchant passes along the encrypted PIN block as sensitive authentication data to the processor for authorization, the merchant has no need to decrypt.

This, unfortunately, makes the encrypted PIN block more of a password than encrypted data. Cloning cards is still quite possible.

Comment Re:It's a very sad day (Score 4, Insightful) 291

Snowden has made no such claims. The claim originated from a leaked document. He provided the document to journalists. The document speaks for itself.

Is the document genuine? That is an entirely different question. I suspect that it is, though no one at the NSA will say. How do you confirm the authenticity of the document? Well, a simple initial approach may be to consider the accuracy of previous document releases. By that standard, it's genuine.

Comment Re:three responses (Score 3, Interesting) 562

Interesting. Warrant requirements generally do not apply to evidence in "plain sight", but if you need a breathalyzer, it's not exactly plain sight, now, is it?

Best I can compare it to would be the use of an infrared camera in search of "grow lights" for basement cannabis farms. A federal judge said, no-baby-no, so I'd have to side with you on this one.

Comment Re:Really, Slashdot? (Score 1) 135

Almost right. The host header is encrypted. The target IP address is in-the-clear for obvious reasons. Your IP stack does not connect to DNS names. It connects to IP addresses. DNS resolves the DNS name, then the stack connects to the address.

Now the DNS name might be unencrypted during the SSL negotiation, but that's not the HTTP header, as your browser has to decide if it likes the SSL cert before it negotiates. Part of that check is "does the host name match the cert?". I'd look up SSL negotiation details, but I'm lazy.

Comment Re: smart (Score 1) 146

Nope. This is a clear FDA overreach. They were not involved in any process designed to diagnose, treat, or prevent illness. They were involved only in protected speech. And because of the FDA, we now have prior restraint on protected speech. 23andme should have released the lawyers on the FDA.

Comment Re:If they get this reversed, it will shut them do (Score 3, Interesting) 198

You can copyright an implementation of a language, but you cannot copyright the language itself. This view is more completely settled in EU law, but there are US cases that have reached the same conclusion.

http://www.cs.columbia.edu/~aho/cs6998/lectures/11-10-11_Zimmeck_ProtectPL.pdf
http://the1709blog.blogspot.com/2013/01/sas-v-wpl-programming-languages-not.html
http://www.out-law.com/en/articles/2013/january/computer-programming-languages-should-not-be-viewed-as-copyrightable-says-high-court-judge/

Comment Re:Bull hockey (Score 1) 198

"If someone attempts to prove prior art that's a different factor"

Yes, and a factor that does not influence copyrightability in the slightest. Perhaps you are thinking of patents? Oracle's patent claims died in the first trial, and they are not appealing that part of the decision. All that remains is copyright. And APIs are purely functional, not creative.

Slashdot Top Deals

Work is the crab grass in the lawn of life. -- Schulz

Working...