Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Comment Re:Digging up some history... (Score 1) 262

I worked at IBM at the time (I designed and wrote a good chunk of the C/C++ compiler back-end used for OS/2), and this is quite true -- but it was aided and abetted by IBMs inability to sell OS/2 outside their traditional corporate markets. OS/2 is sadly dead and not relevant today, and has been in this state since at least 1995.

That compiler was an interesting story -- we (the OS/2 back-end team) were told to write an RPG compiler back end for OS/2 (this was back in 1989). That didn't seem like much fun, but the IR (W-Code) was the same as the one used by the C & C++ compilers for the mainframes. So we decided to make the back-end support C & C++ too -- because that *was* fun. When there was the falling out between MS and IBM, we had a working C and C++ compiler for OS/2. I can still remember getting hello.c running, then dhrystone, and not much later bootstrapping the compiler itself.

That was a long time ago.

Comment How many times are you searching? (Score 1) 82

If we define the genome being searched as the pool, and the string being searched for as the key; The paper could be completely correct when there is no reuse of the pool or keys. If you search the same pool for multiple different keys I can think of ways to pre-process the pool such that the first search + pre-process time still obeys the performance constraints their paper outlines, but subsequent searches of the same pool for a different key could happen in O log n time, or even constant time.

Comment Re:Be hostile back ... (Score 2) 124

I think the grandparent post is completely wrong. We need to fight this on 2 fronts: Technically with encryption *everywhere* (even dram contents -- a DMA controller / IO processor should *never* see plaintext), and politically -- advocating against the surveillance state, voting for politicians who reign it in where ever possible.

(In Canada, in my opinion, this means your obvious choice in the next election is the NDP. They took Alberta, they can take Ottawa.)

Breaking the "rules" as the grandparent post advocates will be *very* counter productive, and will only invite *more* abuses, not less.

Comment Re:need moar encryption (Score 2) 124

Even the *cables* and patch cords can have bugs hidden in the connectors. Trust *nothing*. Encrypt everything -- I think outside sram caches on the CPU there should be no unencrypted data at all -- even dram contents should be encrypted.

Of course Key generation and distribution will be the soft underbelly for NSA, CSEC, GCHQ et al to feast on.

But as you point out, give yourself the "reasonable expectation of privacy" that encrypting everything will allow you to claim in court. Force them to tip their hand with actions. Make "parallel" construction so hard it looks laughably obvious. Make un-targeted surveillance prohibitively expensive. Make targeted spying hard enough and costly enough that they'll only use it against real adversaries and not their own citizens and dissidents / political opposition.

It seems to be the only answer and the only way we'll hold on to the freedoms that so many of our grandparents fought, bled, and died for.

Comment Re:need moar encryption (Score 1) 124

Lrf, lbh unir gb rapelcg rirelguvat orpnhfr lbh pna'g rira gehfg n argjbex lbh pbzcyrgryl pbageby -- gurer ner ohttrq pnoyrf (rgurearg naq hfo) naq onpx-qbbef va ebhgref rgp. Rira vs gur jubyr guvat vf haqre lbhe pbageby, lbh unir gb rapelcg nyy qngn -- ng erfg be va-zbgvba. V ZVTUG gehfg gur ba-puvc pnpurf, ohg qenz fubhyq or rapelcgrq nybat jvgu rirelguvat ryfr. Bs pbhefr xrl trarengvba naq qvfgevohgvba jvyy or gur fbsg haqreoryyl.

Slashdot Top Deals

In the future, you're going to get computers as prizes in breakfast cereals. You'll throw them out because your house will be littered with them.