Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment Re:It's the base assumption that its invalid (Score 1) 392

Once a "backdoor" is added to any encryption system, it is only a matter of time before it is used for nefarious purposes. Any backdoor that a company can be compelled to use via a warrant can also be used by hackers, identity thieves, and foreign governments. If I want the data on my phone to be safe from criminals, it has to also be safe from law enforcement (whether I need that or not). It is literally not possible to have a system that is simultaneously safe from criminal intrusion and has a backdoor.

Comment Re:Tax dollars at work. (Score 1) 674

If someone is inside of my house, and they are legally allowed to be there (i.e. I've invited them in), then I have zero problem with them using my outlets to charge their phone.

If someone is on the train, and they are legally allowed to be there (i.e. they have a valid ticket), then I have zero problem with them using the train's outlets to charge their phone.

If someone is in a government building, and they are legally allowed to be there, then I have zero problem with them using the building's outlets to charge their phone.

Comment Re:Very broken system (Score 2) 212

Simple:

  • Each card and ATM is given a public/private key pair.
  • The public keys are signed by the bank's private key
  • Every card also contains the bank's public key

When the card is inserted, the ATM asks for the card's public key

  1. The ATM then verifies that the card's public key was signed by the bank, using the bank's public key.
  2. The ATM then encrypts a block of random data with the card's public key, and asks the card to decrypt it.
  3. If the card successfully replies with the same random data, it has just proven that it has the private key that it claims to have

Then it's the card's turn to repeat the same process:

  1. It asks the ATM for its public key, verifies that it was signed by the bank, using the bank's public key.
  2. The card encrypts a block of data with the ATM's public key, asks the ATM to decrypt it

At this point, both the card and the ATM know that they are talking to the appropriate device. Each device can then generate a symmetrical key for that session, and encrypt it with the other device's public key, and use those keys for any further communication.

Comment Anonymous Proxy (Score 2) 200

Couldn't these Australian Journalists use an American as an anonymous proxy of sorts? That is, when you find a good source of information, tell him/her to reveal the information to an American, and then use that person as your source. You can then freely name your source, but that source can't be compelled by the Australian courts to name the original source.

Every problem can be solved by adding a layer of indirection ... or beer :)

Slashdot Top Deals

We can found no scientific discipline, nor a healthy profession on the technical mistakes of the Department of Defense and IBM. -- Edsger Dijkstra

Working...