Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Shopping list (Score 1) 406

Started thinking about this and the shopping list came out a lot like one you'd need for your own top to bottom security. Would it really be other governments however? I mean as a private, highly technical individual I'd rather (in order of preference)...

1) Set up my own standalone infrastructure (DNS, IPv6, PKI, CA, eBGP?) and have that counter signed by friends, family, colleagues and the gov of any country of which I'm a citizen.
2) Rely on the infrastructure of multiple trustworthy external entities, both private business and gov.
3) Rely on a single, hopefully trustworthy infrastructure provider (where I am ATM).

Comment Re:Here's a contract for you (Score 2) 95

You know eventually it may boil down to that, I'd guess we'd head to three stereotypes...

1) Acceptance; Either controlled and managed through educated mastery as much as possible or through uneducated disinterest people engage in and allow themselves to be monitored.
2) Mediation; Attempting, regardless of success or even feasibility to allow only either partial or non-invasive monitoring.
3) Rejection; Either active denial (through radio, electronic or electrical jamming, obfuscation or encryption) or significant or total (but not "aggressive") avoidance (such as the Amish).

The first state would (if not already is) the norm, the second (current norm only through lack of technological means) somewhat futile but could maintain a casual level of privacy, the third would be unusual in the "passive" form and potentially (already is to some extents) illegal in the active form.

Adopting any single, static position other than total openness or total passive avoidance would seem pointless and/or futile. Any attempt to remain between the two extremes could only be maintained by the ability to shift between all of them.

Comment Re:I'd be suspicious (Score 1) 333

Redundant, keep reading the whole "What's New" page and the conspiracy klaxon attached to your tin-foil hat will go into hyper-overdrive...

"
Support for the RDRAND random number generator

Status:
Committed to -CURRENT, MFC-ed to 9-stable
Author:
Konstantin Belousov
Web:
http://svn.freebsd.org/changeset/base/240135
RDRAND is the new Intel's CPU instruction for accessing its hardware random number generator, also known as the code-name Bull Mountain. It is present in Ivy Bridge and newer CPUs.
" ...although it would seem more likely that Konstantin Belousov would be working for the FSB rather than the NSA really. ;^)

Comment Re:Read the Followups (Score 1) 321

Someone mod this insightful? Come on it's "obvious" that everyone in the UK Border Agency were all sat around reading Slashdot this morning, http://yro.slashdot.org/story/13/08/18/1641241/wikileaks-releases-a-massive-insurance-file-that-no-one-can-open and then spotted this guy's name popup on some list, put two and two together and ended up with a prime. ;^)

Comment Best available advice? (Score 1) 148

I imagine this has crossed (or should have) the minds of a few people here, is there any "credible" advice about the theoretical process and the best/least-worst practical actions to take if you're approached by your friendly local domestic intelligence agency and told to pony up your company's private keys (for example) along with the explicit instructions not to inform anyone else, ever? For the record I'd like to declare that I've never been in that or any similar position.

Slashdot Top Deals

Neutrinos have bad breadth.

Working...