Forgot your password?
typodupeerror

Comment: Re:Forcing strong passwords in the first place. (Score 2) 211

by bblough (#43574975) Attached to: Mitigating Password Re-Use From the Other End

1) I don't use a single program, I use a single format. I use different programs per platform, but all of them use Password Safe compatible databases. Sync is done via an encrypted cloud storage service.

2) Admittedly, this is a potential issue, but in my opinion there are two problems with this point. First, you trivialize it by saying "all you have to do is crack the keychain." With a strong enough passphrase that will not be easy at all. Second, you're changing the threat model under discussion. A compromised website with re-used passwords is one thing, someone coming directly after your locally stored data (e.g., your keychain) is another. In the first model, the attacker will not have access to your keyring, and therefore has no chance of cracking it. In the second model, if you're the direct target, precautions probably aren't going to matter.

3) Backups. The same encrypted storage service that handles my sync keeps automatic, versioned backups.

Government

+ - Thought Crime Bill Passes House

Submitted by
An anonymous reader writes "From the article-

Designated H.R.1955 and titled the Violent Radicalization and Homegrown Terrorism and Prevention Act of 2007, it is an amendment to the Homeland Security Act of 2002.

This is the first terrorism-related legislation that specifically targets U.S. citizens and the vagueness of the wording is a dangerous threat to the First Amendment and to each of us in ways that have not been attempted before in the United States. The definitions in the bill hold the frightening keys to the undermining of our most basic liberty — to speak freely

http://www.timegoesby.net/weblog/2007/11/thought-crime-b.html"

Help! I'm trapped in a PDP 11/70!

Working...