Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Encryption

Submission + - Brute force resistant storage?

C3ntaur writes: "Hey Cipherheads and Cryptogeeks,

I have decided to get serious about off site backups. Naturally, I don't want my data to be readable by prying eyes, so I'm encrypting it. I've done some research, and it's obvious that passwords suck. If my encrypted data is not physically in my possession — it could be in the cloud, at a friend's house, in a safe deposit box, or whatever — then all an attacker needs is enough time to crack it. Worse, the time during which an attack might be detected is only however long it takes to make a copy. After obtaining that copy they can spend all the time they need to crack it.

According to Wikipedia, "As of 2011, commercial products are available that claim the ability to test up to 2,800,000,000 passwords per second...Such a device can crack a 10 letter single-case password in one day." Passwords really suck.

OK, so I need to use a much stronger key to protect the encrypted data. This is not difficult, a few hundred randomly-generated characters is more than enough. But it's also more than I can commit to memory so I have to store THAT somewhere safe, too. Did I mention the application is an off site backup? The idea being, of course, that if the primary copy of my data is destroyed I have something I can recover from. So I need to store the key somewhere that's not likely to be involved in any event that takes out my primary data. Something that fits in my wallet, perhaps, so it's in my physical control. But wallets can be stolen, and if Evil Attacker is reading this he'll know just where to look for my key file.

So I believe (and apparently so do many others in the industry) that a good solution has two factors: something I have (the key file) combined with something I know (a... password). If I store my key file on something that's password protected then I have two-factor protection.

But passwords suck. What I really need is a key file storage device that can resist a brute force attack. I've heard of smart cards and USB devices that use built-in hardware encryption and will wipe their keys after some number of failed attempts. I imagine even they can be defeated in a sufficiently-equipped lab, but really, I'm not that important or interesting.

Are these devices all they're hyped up to be? What other solutions should I consider?"
Google

Submission + - Google wants to be a wireless carrier (bgr.com)

zacharye writes: Google has already conquered the software side of smartphones and now the technology giant is reportedly in talks to take over the air waves. A report on Thursday claims that Google has held talks with satellite television provider Dish Network regarding the possibility of a venture that would see Google launch its own cellular network and compete directly with the likes of Verizon and AT&T...

Comment Re:But ... (Score 2) 846

...you should no longer have to pay school taxes since you never used the government school.

Wrong. Society as a whole benefits from public education. Children who grow up and have no marketable skills will become a drain on society. Worse, they won't have the understanding to make intelligent choices at the ballot box. If you want a democracy, you want good public education.

Comment Re:Is this news to anyone? (Score 1) 305

On the off chance this isn't a troll... My employer uses a hosted Exchange 2010 provider. Evolution doesn't interoperate with it, and OWA is a joke. Everyone I do business with uses Microsoft Office, and although OpenOffice and LibreOffice often get document conversions correct, they have failed often enough that I find it's not worth the bother. Diagramming: Visio wins, hands down. I used to use dia, but finally saw the light.

Slashdot Top Deals

Understanding is always the understanding of a smaller problem in relation to a bigger problem. -- P.D. Ouspensky

Working...