Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
Note: You can take 10% off all Slashdot Deals with coupon code "slashdot10off." ×

Comment Re:Thank the Feds (Score 1) 392

I think it was as much that stolen smart phones, especially with the ability to iPay, gWallet, Pay Pal, or what ever technology potentially opened up smart phone manufactures and application developers to new financial liabilities.

For this reason alone, a prudent smart phone manufacturer would want to ensure his/her customers were able to store sensitive financial information on the device and greatly limit the exposure to financial crime carried out by your average everyday pickpocket. Just think about how all of the credit card payment system are moving to "chip cards" that produce a one-time hash for the transaction instead of simply supplying 20 digits to identify a given card and expiration (and up to 24 with CVV).

Comment Re:How did they solve crimes before Smart phones?? (Score 1) 392

Don't you know that prior to 2007, all capitol crimes went unpunished, because it was impossible to determine who had committed such? Then with the universal data gathering tool, created singularly by Steven Jobs, of Cupertino, California, no capitol crime went unavenged. That is until Tim Cook reversed this capability with encryption.

Get your facts straight people!

Comment Old Man Look at yourself I'm a lot like you _are_ (Score 1) 574

IMHO, Neil Young has settled in to the Old Man who's younger self was the same, except as the older man. From all the interviews I've seen, he's hated digital recording (cd's), doesn't like what MP3's do to music, and doesn't like streaming. Even though, as a singer/songwriter streaming will pay him just fine.

Comment Re:Knowing when not to (Score 1) 345

I really like your point about the C++ Master writing for a C++ Novice. I've always had that as a goal, make statements that are easy to read, but at the same time powerful.

One thing I've thought that is a most important feature of C++ are automatic variables, which leads to Acquisition is Initialization ( https://en.wikipedia.org/wiki/... ). In some ways C# (and .NET) has this ability, but Java definitely doesn't do so well. Resource allocation (pointers, mutexes, files, etc.) are some of the hardest things to keep track of in any language. Garbage collectors are fine, but even languages with these don't do so well with OS objects (files, semaphores, etc.). I think C++ shines when you can master this pattern and use it to make very readable and reliable programs.

Comment A consultant's experience (Score 3, Insightful) 110

In my experience as a consultant, this is the case because Business Managers don't trust IT because:

1) The IT department inserts (perceived) too many non functional requirements on a project increasing cost or schedule.
1.a) (Perceived) The IT department doesn't care about the needs of the Business Manager's daily business.
2) Internally the IT department did not deliver on it's own projects within cost or schedule.
3) There's no way that an employee could be as smart as a consultant.

Having been a former IT employee and now a consultant, points 1, 1.a, & 2 are valid, point 3 is just bunk. Now being an consultant, I prefer to work with Business Managers because:

1) Business Managers have a vested interested in seeing a vendor project complete, where as IT typically does not, it's not their money or idea.
2) Business Managers will make time to meet with a vendor, where as IT typically think of vendors as hired hands, about as valuable as the lady who vaccuumes the floors every night.

Comment Re:PRIVATE encryption of everything just became... (Score 1) 379

The question is not breaking the key but determining the message underneath. The blocks are still only 128 bits in length, deducing these can be trivial, and that is how the HTTPS/SSL/TLS attach are accomplished, via known plain text attacks.

Comment Re:PRIVATE encryption of everything just became... (Score 2) 379

Today on CNN, the commentators after the Brennan press conference said that the CIA was correct in saying that no non-bad-guys were killed by drone strikes. That's because the CIA redefined bad-guys to be any human of fighting age (13-60). So, that means that Grandma and your kid brother are free to use encryption, because they definitely aren't terrorists. They get to keep their shoes on at the airport, so there you go!

Comment Re:PRIVATE encryption of everything just became... (Score 1) 379

Thanks TechyImmigrant! Lost track of the block size for a moment. Over the last three years, I've been developing a block cypher. I was surprised to see that AES sole security is XORing the key with mono-substitution translations of the plain text. The 128 bit version can be broken on my laptop...

Comment Re:PRIVATE encryption of everything just became... (Score 2, Informative) 379

Don't forget it is the NSA who approves what type of encryption are legal for citizens to own. In the case of AES relies solely that combining 256 random bits with 256 non random bits, sufficiently, is too difficult to decipher except for the most powerful computer systems.

Comment Re:Should be Easy to Check (Score 1) 178

There was a case where Best Buy (long time ago when 100MB Zip disk were the rage) re-sold Zip-disks containing someone's pr0n stash. So the source of the media doesn't really matter.

Any media, no matter what it's packaging can be a vector for viruses. USB is the most heinous because a device could be the size of a micro BlueTooth tranciever, report it self as a keyboard, and install gigabytes of virus code on a computer system. There's no bigger risk to security than physical contact.

"Pok pok pok, P'kok!" -- Superchicken

Working...