Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:Security clearance (Score 0) 420

Doesn't work that well; since there are enough close-partner-countries that much of that work can go oversees as well. For example, you'll notice the [Navy's new railguns have BAE logos on them](https://www.youtube.com/watch?v=ygHN-vplJZg) so those jobs can be offshored to the UK. Outsourcing internationally is everywhere now.

Comment not outside the jurisdiction of the NSA (Score 3, Interesting) 135

That's not a security move

It's also not outside the jurisdiction of the NSA.

Recall that the NSA is a DoD sub-agency --- so is quite restriced from spying on US Citizens inside the US. However DoD intel agencies are much more free to spy on international -- in fact, it's their main job.

It seems to me this moves it INSIDE the jurisdiction of the NSA.

Comment Re:Not authorized is worse than unconstional. (Score 1) 237

for congress ... behavior of the nsa ...

The whole thing is silly because it's re-directing the focus to a tiny subset of some archaic historical communication system (phone call metadata).

It's like saying that they shouldn't get to make maps of smoke signal fire pit locations.

This is all just to distract people from their bulk collection of internet communications; and giving politicians an opportunity to say "see, I'm tough on privacy" without actually accomplishing anything significant.

Comment Got more offers by not being interested (Score 2) 227

Last year I realized that I'd never changed my LinkedIn job profile info to "not interested" after starting my new job a year earlier. I'd been getting a lot of pings from recruiters, and I thought that might discourage them. Nope. Saying I wasn't interested made the recruiters even more interested in me!

Which would be great if any of them had a job better than my current one, but they never do. Everything is more boring work I'm less qualified for, for less pay.

Comment Re:The good news is... (Score 4, Insightful) 211

It was horrible. I did a really crappy job.

Sadly, you were probably better than the guy before you and the guy after you.

I venture to say that just because you realized you were doing a bad job, you were already doing a better job than the vast majority of managers (especially ones who think of themselves as "good").

Encryption

Generate Memorizable Passphrases That Even the NSA Can't Guess 267

HughPickens.com writes Micah Lee writes at The Intercept that coming up with a good passphrase by just thinking of one is incredibly hard, and if your adversary really is capable of one trillion guesses per second, you'll probably do a bad job of it. It turns out humans are a species of patterns, and they are incapable of doing anything in a truly random fashion. But there is a method for generating passphrases that are both impossible for even the most powerful attackers to guess, yet very possible for humans to memorize. First, grab a copy of the Diceware word list, which contains 7,776 English words — 37 pages for those of you printing at home. You'll notice that next to each word is a five-digit number, with each digit being between 1 and 6. Now grab some six-sided dice (yes, actual real physical dice), and roll them several times, writing down the numbers that you get. You'll need a total of five dice rolls to come up with each word in your passphrase. Using Diceware, you end up with passphrases that look like "cap liz donna demon self", "bang vivo thread duct knob train", and "brig alert rope welsh foss rang orb". If you want a stronger passphrase you can use more words; if a weaker passphrase is ok for your purpose you can use less words. If you choose two words for your passphrase, there are 60,466,176 different potential passphrases. A five-word passphrase would be cracked in just under six months and a six-word passphrase would take 3,505 years, on average, at a trillion guesses a second.

After you've generated your passphrase, the next step is to commit it to memory.You should write your new passphrase down on a piece of paper and carry it with you for as long as you need. Each time you need to type it, try typing it from memory first, but look at the paper if you need to. Assuming you type it a couple times a day, it shouldn't take more than two or three days before you no longer need the paper, at which point you should destroy it. "Simple, random passphrases, in other words, are just as good at protecting the next whistleblowing spy as they are at securing your laptop," concludes Lee. "It's a shame that we live in a world where ordinary citizens need that level of protection, but as long as we do, the Diceware system makes it possible to get CIA-level protection without going through black ops training."

Comment Re:One-sided relationship (Score 1) 139

We don't want American spy agencies listening to our https traffic either. Just because Alice is shooting at me, it doesn't suddenly make it OK for Bob to stab me too.

This is an attack against the SSL trust model. A CA knowingly created a rogue certificate for malicious purposes. This wasn't an accident. A Diginotar type response would not be inappropriate.

Slashdot Top Deals

If you want to put yourself on the map, publish your own map.

Working...