Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:How is this a good thing? (Score 3, Interesting) 115

They are the intelligence community, not our national cybersecurity consulting firm, and they only ought to be notifying the public if the risk to national security involved in leaving the vulnerability open is greater than the risk to national security involved in losing the intelligence that could be gained from it.

What you're saying is we HAVE NO national cybersecurity entity whose purpose is to protect our infrastructure from bad actors using exactly the kinds of methods and exploits we're seeing here. And given that, we have to rely on Kaspersky to do it for us. Not only is it then a good thing, it's long overdue.

Comment Re:How is this a good thing? (Score 4, Insightful) 115

So everyone should just leave their doors wide open so the cops never have to break a door down to nab a crook? Yeah, right. If the NSA can hack into our computers, the bad guys can too. The best way to improve cybersecurity is to fix all the exploitable holes they've been using. But instead of helping us to secure our systems they've left them vulnerable because they're too lazy to pound the pavement, get individual warrants and plant bugs. Having every computer system in the world remain vulnerable made their job easier, so they chose that route, which also made the bad guys efforts easier too. But hey, it's job security, eh?

Comment Re: It's a vast field.... (Score 1) 809

So, your manager asks for it, tells you we need it. You provide him the above explanation and his eyes glaze over. He clearly either doesn't understand your explanation or doesn't care. He repeats his original statement-- I want it, we need it. You go around that way a few times and get nowhere. What do you do?

I suppose you could look for another job.

So when that happened to me, pretty much just like that, what I did was use a hash on the passwords (SHA-256 IIRC, it was a long time ago), then asymmetrically encrypt/decrypt the resultant hash with hardcoded keys just so they could say they secured their passwords with asymmetrical encryption. And customers are very unlikely to know the difference (or at least, ours were), so there was no real risk if the sales force blabbed about it like that as if it were a useful feature. When management gets a security buzzword stuck in their heads and they think they want it and can't or won't be convinced it's not the solution they think it is, you give it to to them if you want to keep your job regardless of whether it makes any sense or not. Some developers won't even bother to find out what the right solution is, or have the luxury to actually implement it. I gave them what they needed, then bolted what they wanted on top as window dressing. And management will never read my comments on that code, which explain exactly what happened.

Comment Re:It's a vast field.... (Score 1) 809

Why would you use it? Because someone in management read some unrelated article about security somewhere that said it was necessary for security and if you don't use it in your implementation you're not doing it right. Or someone in sales had a customer ask if our product uses it for security so now whether or not it makes any sense you have to figure out how to make use of it because management won't take "that's complete nonsense and it's useless in that context" for an answer.

Comment Re:It's a vast field.... (Score 1) 809

I've been doing it for 35 years and only once was I asked to do anything with encryption. The funny thing is, what I was asked to do made no sense whatsoever, and would be completely ineffective towards their security goal, essentially demanding I use an encryption standard that was for a completely different job-- I was to essentially use a screwdriver to hammer nails. I was unable to convince them otherwise, so I decided to use the right tool to do the job, then bolted the bogus screwdriver on top so they also got what they thought they wanted. I didn't need to do that but I just couldn't see going through some useless security ritual without actually providing any security. They got what they needed only because I cared enough to spend the extra time to give it to them. The thing to realize is management is often incompetent as well, especially when they think they know something about a technical solution merely because an ignorant customer asked them, "does it do ?" I hoped they wouldn't advertise what they thought they were doing because any customer who knew the subject would recognize it as bogus voodoo.

Good security is hard. VERY HARD. The government is often bad at it. Sony is bad at it. Banks are bad at it. In fact, I can't point to anyone who's known to be good at it except maybe Zimmerman, and I don't even know that for sure. And users don't like it and will often bypass or otherwise subvert it themselves. But it's not because engineers are incompetent. Often they're not even asked to provide security and it isn't even on their radar. And sometimes when they are asked to provide security they are saddled with bogus requirements for how it should be done. Good security affects the user interface and the users behavior, and that's an area that companies prefer to stay out of because it's unpopular, at odds with productivity, and isn't readily seen to contribute to their bottom line.

Comment Re: Gag warrants... (Score 1) 159

I don't see them automatically sending NSLs to every company in the United States, even just once, much less on a regular basis. That in itself would create quite a stir. And if they try to do it just to companies who've published canaries, they'll be playing whack-a-mole with them. And they can't pass a law pre-empting canaries in general without running into freedom of speech problems. No, I don't see they can stomp on canaries and still continue to fly under the radar.

Comment Re:Gag warrants... (Score 1) 159

I would suggest there is a much cleaner way for the TLAs to make warrant canaries ineffective. Send a warrant to every company that publishes a canary. In a short space of time, no company of any note will have a canary, and the whole point of issuing a canary is defeated.

Too risky-- it would show up in Canary Watch when they all dissapear, and you'd start seeing a lot of new canaries being published by companies who hadn't done it before, which would then all get their own NSLs, and the whole thing would continue to snowball until someone refused to comply with an NSL and the resulting stink would probably kill off NSLs alltogether.

Comment Re: EFF actions aid terrorists (Score 1) 159

What probable cause? You obviously haven't been paying attention. The Snowden release has proven without a doubt that probable cause restrictions are ancient history. The Constitution is supposed to set limits in government, but the government has been treating Section 215 as a one-size-fits-all loophole that permits anything.

Comment Re:EFF actions aid terrorists (Score 2) 159

Frankly, there's far less threat from terrorism than there is from government overreach. Now, that's not the government's opinion on the matter, which should be no surprise, but I'm not the government. As an average citizen, I'm far more likely to be struck by lightning, or to be a victim of mistaken identity by some government agency (already happened, once), than I am to be a victim of a terrorist. Given that, the terrorists aren't the only "enemy" here, nor are they the most dangerous one by any measure.

Comment The real study... (Score 1) 700

A useful study would be to ask the question-- on average, what provides better outcomes, 1) a really small class size taught by amateur teachers, possibly as a second job, or 2) large class sizes taught by professionals who don't have a second job (for the most part, anyway), but may be burnt out or are provided with few resources or support. I'm glad it's a decision I don't have to make, but I'm sure glad home schooling wasn't in vogue when I was a kid. My parent's couldn't decide which church to take me to (one Catholic, one Protestant), tried to compromise (Episcopalian), found it met neither of their needs and lost interest (thankfully, as far as I am concerned). I shudder to think what that dynamic might have done to my education...

Comment Re:Why different in America? (Score 2) 700

Actually home schooling can be popular both on the right and in the left. The right so they can be taught to whatever the parents think are Biblical principles, and the left in order to "protect" the child's self esteem, improve on the quality, or some other justification of that sort. It might also be important to remember that the quality of public education in the US since the 1960s or so has not fared so well, many baby boomers have realized public education today isn't as good as it was when they went to school-- largely because public schools have been under attack by the right in the years since. And then people wonder why things are so polarized, when both the left and right are home-schooling to their personal tastes.

Slashdot Top Deals

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...