Forgot your password?
typodupeerror

Comment: searching encrypted data (Score 1) 266

by Bert690 (#27602855) Attached to: Encrypted But Searchable Online Storage?
There are techniques to do this but none have made it out of academia. Most are quite inefficient and support very restricted querying models. Here's one paper that claims their methods are "practical" (but always keep in mind that academic claims of practicality should always be taken with a grain of salt):

http://www.cs.berkeley.edu/~dawnsong/papers/se.pdf

Comment: Re:concerns alleviated... (Score 1) 174

by Bert690 (#27565467) Attached to: Google Open Sources Updater

Bait and switch would be just like these guys!

Google wants an auto updater so badly because it allows them to gather more information on you. Why else would it have ever included a unique identifier?

The purpose of the ID is described here. But you may need to take off the tin foil hat before you can understand it.

GoogleUpdate also uses its own, randomly-generated unique ID number to accurately count total users. This information includes version numbers, languages, operating system, and other install or update-related details, such as whether or not the applications have been run. This information is not associated with you or your Google Account.

Math

+ - MIT dude disproves Wolfram on 44 conjectures 2

Submitted by blue2
blue2 (1204964) writes "Fresh out of press from the "Journal of cellular automata" ... geeky author Evangelos Georgiadis disproves legendary Stephen Wolfram on 44 conjectures. Abstract reads: In this note, we disprove 44 claims in [4] on minimal Boolean formula size of one-dimensional two-state nearest neighbor cellular automata as well as set a new lowersize bound. http://www.oldcitypublishing.com/JCA/JCA%202.4%20abstracts/GEORGIADIS.html"

"Never give in. Never give in. Never. Never. Never." -- Winston Churchill

Working...