Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Single Byte Key (Score 1) 277

So the single byte key is derived in some undiscovered manner from the password. Given how weak the encryption is known to be already, I wonder if one out of 256 encryption keys turn out to be a zero byte. In such a case, the encryption would leave the file unchanged. (Could be patched with "key=key?key:1;")

Comment Re:Roll your own! (Score 1) 292

There's an outfit in Florida that's advertising your choice of new or restored 1964.5 Ford Mustangs. If you get one "new" they create a VIN that refers to their company - if you get one restored, you get the VIN of the donor car they rebuild. They upgrade safety and emissions to some degree, but I don't know how they meet modern requirements for their "new" cars. (See http://revologycars.com/faqs/ )

Comment Where is this headed? (Score 1) 292

The real issue that we're going to be up against is whether 3rd parties will be permitted to continue to manufacture replacement parts. Soon every part incorporates an RFID, and the car refuses to start without all the RFID tags matching the authorization database. Perhaps they'll start with all the parts that they can justify as safety-critical, 'cause, you know, for the children. The government could even push for this in order to make sure that mileage and pollution critical parts are kept unmodified, 'cause, you know, for the environment. Then when the complaints pour in that it's anticompetitive, they'll authorize third parties so long as they tithe back to the original manufacturer, 'cause, you know, for the corporations. Finally, after some number of years, they'll just deauthorize all the parts, so you have to scrap the car, 'cause, you know, you need a new car, or just because they can't be bothered to keep supplying security updates for the buggy software.

Comment Re:Maybe it's for the same reason (Score 1) 184

I'm not defending the insane assortment of completely unnecessary sizes of barrel connectors. I'd agree that it's all horseshit - it would only make some sense if the sizes were related to the voltage, such as one size for 5v, one size for 12V, one size for 29V, etc. It's hard to imagine that manufacturers really get big money out of continually changing power connectors and battery pack designs - it never takes very long for ebay & amazon to start selling third party supplies and batteries. My personal bugaboo is how far laptops need to be torn apart to replace these connectors - and - stiff connectors that seem designed to stick out just perfectly far enough and stiff enough to maximally damage the receptacle.

In any case, two conductive contacts ought to be enough for any small or mobile device's power and data needs, and neither is there any no good justification having distinct connectors for networks, disk drives, displays and accessories. USB is among the most phenomical kludges of all time, with all the different connectors, profiles, and adapters - and Apple, as well as HP, and others have gunked it up with all manner of proprietary kludges to negotiate high power charging. The USB-C "standard" connector actually has 24 teeny little pins, doubled up from 12 just so the connector can be rotated 180 degrees. I really don't think it's a step forward to use a 24-pin connector to power a laptop.

Comment Re:Maybe it's for the same reason (Score 1) 184

One connector is enough when the data is wireless. And it seems like you already got started on the insane assortment of completely unnecessary sizes of barrel connectors just by mentioning them.

If you insist on data being passed over a connector, packets of serial data could be passed over the power connector by modulating the power of the supply or the impedance of the device. Think of POE.

Comment Re:Maybe it's for the same reason (Score 1) 184

There are more than TWO orientations. A simple cylindrical connector could allow "any" orientation (OK, any orientation that's pointing in the right general direction.), in the manner of almost every non-Apple laptop power connector and pre-USB cellphones.

Especially now that there's all number of wireless data connections, going back to a simple "retro" power connector should be easier than any connector that has to handle both power and data.

Comment Keep hard drives outside of your circle of trust. (Score 1) 324

If you cannot audit the source code of the hard drive firmware, you must keep hard drives outside of your circle of trust. That means that all hard drive traffic should be encrypted with keys not available to the hard drive. Digital signatures and time stamps can also be employed to ensure that the drive isn't utilizing replay attacks or swapping blocks around. As a bonus, this protects against failures in the transmission path, in even stronger ways than ZFS uses checksums. And remember, once you're out, you're out. There's no coming back.

Slashdot Top Deals

The Tao is like a glob pattern: used but never used up. It is like the extern void: filled with infinite possibilities.

Working...