Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:Sure (Score 1) 500

Hey, it's an approach. Nothing works until it gets past a judge. It would have made for a better argument than the one he used (maybe).

Don't get me wrong. I'm not supporting a street thug. But law is a logic puzzle mixed with human irrationality. For instance, check out the genius who called me an idiot below. "That's not fair, so it can't be right!" Nope, doesn't work that way.

Comment Useless effort (Score 3, Insightful) 115

If by "don't want to compromise the investigation" they mean "don't want to let the crooks know what we know", they have already failed. Any action to remove material now is simply playing to politics.

Personally, I think the value of publishing the data is higher than not tipping your cards to crooks. They know what they left behind.

Comment Re: 3des (Score 1) 213

Yes, the key is needed to encrypt, but the encrypted PIN block is already encrypted by the card embosser on behalf of the bank. If the merchant passes along the encrypted PIN block as sensitive authentication data to the processor for authorization, the merchant has no need to decrypt.

This, unfortunately, makes the encrypted PIN block more of a password than encrypted data. Cloning cards is still quite possible.

Comment Re:It's a very sad day (Score 4, Insightful) 291

Snowden has made no such claims. The claim originated from a leaked document. He provided the document to journalists. The document speaks for itself.

Is the document genuine? That is an entirely different question. I suspect that it is, though no one at the NSA will say. How do you confirm the authenticity of the document? Well, a simple initial approach may be to consider the accuracy of previous document releases. By that standard, it's genuine.

Slashdot Top Deals

What is research but a blind date with knowledge? -- Will Harvey

Working...