Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Missing the point (Score 1) 134

3) takes time to make. The quicker it is to create the hash, the quicker it is to brute-force your way through all possible combinations to find a hash that matches.

Most password cracking happens by getting a list of hashed password values through some other securitu exploit, and running as many hashes as you can as quickly as you can to find match. If they're claiming a fast hash is a good thing, they're missing the point.

Bullshit. You don't bruteforce a 512 bit hash, no matter how fast it is. It simply doesn't work like that. You must find a weakness in the algorithm to break even much smaller hashes.

Comment Re:FDE (Score 1) 325

  • Nothing is stored on the exit node, it's just pointless to encrypt it.
  • I've been running full disk encryption on my Linux systems for years, how to do it is standardized and doesn't need third-party products.

Comment Re:non-destructive backup plan (Score 4, Insightful) 325

The problem is not the exit node, no information of any value contains there, and nothing that can incriminate you will be on the exit node.

The problem is the complete raid of everything of value you own and depend on that had no part in the exit node, no matter what is stored on the machines. Likely keeping them for months, even years depending on how far they want to go with the case.

Comment Re:Thanks for your help (Score 2) 73

Why would you find a new host when you're obviously not a customer at the hosting provider implementing this change? Or did you mean that you want to change from your current one to actually use this new, because you approve of the changes? Your two messages here are very conflicting.

Comment Re:I'm confused, or ill-informed (Score 4, Informative) 119

It can actually replace both, which is pretty interesting and might change how our current computing model is built.

There are already applications and systems in place to model the data storage like this, for example memory-mapped file I/O, where you basically tell the operating system that "please let me pretend that this huge file on the hard drive is already in RAM", and let the RAM be some sort of huge cache. The same model would apply to storage here, except we would get rid of the whole RAM layer between storage and CPU.

Comment Re:New exploit for corporations (Score 1) 562

Of course, but that doesn't account for power loss in the distribution network: long power lines, transformers, etc. That's probably what the issue is about here. The AT&T network has its own overhead, something the customer can not measure nor influence, and AT&T charge for this overhead but refuse to release the details.

You could measure your power usage to 17653.8 kWh, your provider measures 19877.2 on its end. What's the number they should use for billing?

Comment Re: a gigabyte is a gigabyte (Score 1) 562

They have ALWAYS used the standard and correct interpretation. Always. One gigabyte is one gigabyte, 1000000000 bytes. From the first hard drives to the current. You don't need to tell them what a gigabyte is.

It's not their fault your operating system doesn't know the difference between 1000 and 1024.

Slashdot Top Deals

I have hardly ever known a mathematician who was capable of reasoning. -- Plato

Working...