Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Comment Re:Tax dollars at work. (Score 1) 674 674

If someone is inside of my house, and they are legally allowed to be there (i.e. I've invited them in), then I have zero problem with them using my outlets to charge their phone.

If someone is on the train, and they are legally allowed to be there (i.e. they have a valid ticket), then I have zero problem with them using the train's outlets to charge their phone.

If someone is in a government building, and they are legally allowed to be there, then I have zero problem with them using the building's outlets to charge their phone.

Comment Re:Nonsense (Score 1) 328 328

Police with a warrant can open doors, break chains, crack safes, pick locks, take your keys, or do pretty much anything else they want to do to get access to your private information.

Then let them break the encryption themselves, they shouldn't be allowed to force me to help them.

Comment Re:Very broken system (Score 2) 212 212

Simple:

  • Each card and ATM is given a public/private key pair.
  • The public keys are signed by the bank's private key
  • Every card also contains the bank's public key

When the card is inserted, the ATM asks for the card's public key

  1. The ATM then verifies that the card's public key was signed by the bank, using the bank's public key.
  2. The ATM then encrypts a block of random data with the card's public key, and asks the card to decrypt it.
  3. If the card successfully replies with the same random data, it has just proven that it has the private key that it claims to have

Then it's the card's turn to repeat the same process:

  1. It asks the ATM for its public key, verifies that it was signed by the bank, using the bank's public key.
  2. The card encrypts a block of data with the ATM's public key, asks the ATM to decrypt it

At this point, both the card and the ATM know that they are talking to the appropriate device. Each device can then generate a symmetrical key for that session, and encrypt it with the other device's public key, and use those keys for any further communication.

Comment Re:Off-topic advice (Score 1) 116 116

The way that Apple did. A single binary (whether executable or library) can contain code for multiple instruction sets. There is no need for separate areas on the file system for 32- or 64-bit support, there is no need for separate 32- or 64-bit builds of the OS, etc.

Comment Anonymous Proxy (Score 2) 200 200

Couldn't these Australian Journalists use an American as an anonymous proxy of sorts? That is, when you find a good source of information, tell him/her to reveal the information to an American, and then use that person as your source. You can then freely name your source, but that source can't be compelled by the Australian courts to name the original source.

Every problem can be solved by adding a layer of indirection ... or beer :)

The last person that quit or was fired will be held responsible for everything that goes wrong -- until the next person quits or is fired.

Working...