Become a fan of Slashdot on Facebook


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Re:Forcing strong passwords in the first place. (Score 2) 211

by bblough (#43574975) Attached to: Mitigating Password Re-Use From the Other End

1) I don't use a single program, I use a single format. I use different programs per platform, but all of them use Password Safe compatible databases. Sync is done via an encrypted cloud storage service.

2) Admittedly, this is a potential issue, but in my opinion there are two problems with this point. First, you trivialize it by saying "all you have to do is crack the keychain." With a strong enough passphrase that will not be easy at all. Second, you're changing the threat model under discussion. A compromised website with re-used passwords is one thing, someone coming directly after your locally stored data (e.g., your keychain) is another. In the first model, the attacker will not have access to your keyring, and therefore has no chance of cracking it. In the second model, if you're the direct target, precautions probably aren't going to matter.

3) Backups. The same encrypted storage service that handles my sync keeps automatic, versioned backups.


+ - Thought Crime Bill Passes House

Submitted by
An anonymous reader writes "From the article-

Designated H.R.1955 and titled the Violent Radicalization and Homegrown Terrorism and Prevention Act of 2007, it is an amendment to the Homeland Security Act of 2002.

This is the first terrorism-related legislation that specifically targets U.S. citizens and the vagueness of the wording is a dangerous threat to the First Amendment and to each of us in ways that have not been attempted before in the United States. The definitions in the bill hold the frightening keys to the undermining of our most basic liberty — to speak freely"

This process can check if this value is zero, and if it is, it does something child-like. -- Forbes Burkowski, CS 454, University of Washington