Forgot your password?

Comment: The Meat of It (Score 1) 151

by SJ2000 (#46503523) Attached to: Aussie Attorney General's War On Encrypted Web Services
The article is rubbish so, with that in mind, here are some excerpts:

The Department is also advised that sophisticated criminals and terrorists are exploiting encryption and related counter-interception techniques to frustrate law enforcement and security investigations, either by taking advantage of default-encrypted communications services or by adopting advanced encryption solutions. The Department’s current view is that law enforcement, anti-corruption and national security agencies should be permitted to apply to an independent issuing authority for a warrant authorising the agency to issue ‘intelligibility assistance notices’ to service providers or other persons. The issuing authority should be permitted to impose conditions or restrictions on the scope of this authority.

Where issued to a service provider, such notices would formalise existing arrangements....

When issued to a person other than a service provider, such as the subject of a warrant, the Department’s preliminary view is that a notice would operate in a similar fashion to orders made under section 3LA of the Crimes Act 1914. Section 3LA permits agencies that have seized physical hardware, such as a computer or an external hard drive, under a search warrant to apply for a further warrant requiring a person to ‘provide any information or assistance that is reasonable and necessary’ to allow information held on the device to be converted into an intelligible form.

...issuing authorities should be able to authorise an agency to issue ‘intelligibility assistance notices’, requiring a person to provide information or assistance to place previously lawfully accessed communications into an intelligible form, as discussed by the PJCIS at Recommendation 16...

Recommendation 16
The Committee recommends that, should the Government decide to develop an offence for failure to assist in decrypting communications, the offence be developed in consultation with the telecommunications industry, the Department of Broadband Communications and the Digital Economy, and the Australian Communications and Media Authority. It is important that any such offence be expressed with sufficient specificity so that telecommunications providers are left with a clear understanding of their obligations. ...
The Department’s preliminary view is to support recommendation 16 in principle.

- Comprehensive revision of the Telecommunications (Interception and Access) Act 1979, Submission 26

Comment: Re:Metlink IRP (Score 1) 287

by SJ2000 (#45925093) Attached to: Australian Teen Reports SQL Injection Vulnerability, Company Calls Police

No. This is simply wrong. If "Metlink were simply following their IRP" then they would have started investigating and taking action last month when their gaping security violation was first reported. Instead they did nothing until exposure of their incompetence was threatened by mainstream media.

It all depends on the IRP, most Australian transport organisations do not have a incident response plan for this report from a member of the public (I.T. or otherwise), but they do have them for various PR issues such as public disclosure of security issue (I.T. or otherwise). I'm not saying it's right I'm just explaining how it occurs, and given the public profile of the incident, I'm not sure I'd want to be the one deviating from the established IRP even if it wasn't written with this in mind.


Hitachi's Tiny Robo-Taxi Carries 1 Passenger and No Driver 86

Posted by timothy
from the perfect-for-class-reunion-showoffs dept.
New submitter terrywo5 writes "A new driver-less robotic car nicknamed ROPITS was revealed recently by Hitachi in the city of Tsukuba. This tiny robotic car uses GPS to transport its single passenger, and it can be programmed to pick up and drop passengers automatically. Check this article and video to learn more about this car."

Engineers Build "Self-Healing" Chips Capable of Repairing Themselves 68

Posted by samzenpus
from the electronics-heal-thyself dept.
hypnosec writes "A Team of researchers and engineers at California Institute of Technology (Caltech) has developed 'self-healing' chips (PDF) that can heal themselves within a few microseconds. The team tested their work by damaging amplifiers in several places using high-powered lasers. In less than a second the chips were able to develop work-arounds thereby healing themselves."

Comment: Re:It's a third party not the ATO (Score 1) 84

by SJ2000 (#43044111) Attached to: Australian Tax Office Stores Passwords In Clear Text
That's right, summary is completely false.

The system is run externally by the warehouse and separately to the ATO," a spokesperson told SC....It is unable to access taxpayer information or their details. There are no financial or bank account details stored on POS.

A case of not reading the article, it's blatant FUD.

The Military

Boeing Touts Fighter Jet To Rival F-35 — At Half the Price 497

Posted by Soulskill
from the but-is-it-a-robot? dept.
An anonymous reader sends this news from the CBC: "In a dogfight of defense contractors, the hunter can quickly become the hunted. It's happening now to the F-35. The world's largest defense contractor, Lockheed Martin, is trying to convince wavering U.S. allies — including Canada — to stick with its high-tech, high-priced and unproven F-35 stealth fighter. But the F-35 is way behind schedule, way over budget and, now, it's grounded by a mysterious crack in a turbine fan. After years of technical problems, it's a tempting target for Lockheed Martin's rivals. It's no surprise, then, that the No. 2 defense contractor, Boeing, smells blood... The Super Hornet, it says, is a proven fighter while the F-35 is just a concept — and an expensive one at that. ... The Super Hornet currently sells for about $55 million U.S. apiece; the Pentagon expects the F-35 to cost twice as much — about $110 million."

Stellar rays prove fibbing never pays. Embezzlement is another matter.