The article of interest is a report of a trip to the 1992 EuroCrypt conference by an NSA cryptographer whose name is redacted.We all get a little bored having to sit though presentations that are off topic, boring or even down right silly but we generally don't write our opinions down. In this case the criticisms are cutting and they reveal a lot about the attitude of the NSA cryptographers. You need to keep in mind as you read that this is intended for the NSA crypto community and as such the writer would have felt at home with what was being written.
Take for example:
Three of the last four sessions were of no value whatever, and indeed there was almost nothing at Eurocrypt to interest us (this is good news!). The scholarship was actually extremely good; it’s just that the directions which external cryptologic researchers have taken are remarkably far from our own lines of interest.
It seems that back in 1992 academic cryptographers were working on things that the NSA didn't consider of any importance. Could things be the same now?
The gulf between the two camps couldn't be better expressed than:
The conference again offered an interesting view into the thought processes of the world’s leading “cryptologists.” It is indeed remarkable how far the Agency has strayed from the True Path.
The ironic comment is clearly suggesting that the NSA is on the "true path" whatever that might be.
Clearly the gap between the NSA and the academic crypto community is probably as wide today with the different approaches to the problem being driven by what each wants to achieve. It is worth reading the rest of the article."
Link to Original Source
Soooo...you read all that and not the article? They made a config with all privacy options used.
Matthew Green tackled iOS encryption, concluding that at bottom the change really boils down to applying the existing iOS encryption methods to more data. He also reviews the iOS approach, which uses Apple's "Secure Enclave" chip as the basis for the encryption and guesses at how it is that Apple can say it's unable to decrypt the devices. He concludes, with some clarification from a commenter, that Apple really can't (unless you use a weak password which can be brute-forced, and even then it's hard).
Nikolay Elenkov looks into the preview release of Android "L". He finds that not only has Google turned encryption on by default, but appears to have incorporated hardware-based security as well, to make it impossible (or at least much more difficult) to perform brute force password searches off-device."
This should mark the Godwin point for this thread, but your post is too informative for that. Congrats, you have found an exception to the law!
I have a nicely packaged answer for you: Rob Ford. Corruption is not a Quebec thing, they are just doing their cleanup in public. Transparency at it's finest.
Link to Original Source
"In short, we hold that cell site location information is within the subscriber’s reasonable expectation of privacy," the United States Court of Appeals for the Eleventh Circuit ruled. "The obtaining of that data without a warrant is a Fourth Amendment violation.""
It doesn't work to do this with a democratic government. We need a monarchy
Or perhaps a font of sage wisdom? You know, like a Council? Composed of wise people, you know, like one's Elders? Something any sentient species ought to be able to figure out. Speaking of which, I feel another press release coming on...
K'Breel, Speaker for the Council, addresses the publication of the new report thusly:
"WE HAVE TRIUMPHED! Our skilled operatives from the Division of Behavioral and Social Sciences and Propaganda; Planetary Research Council have successfully infiltrated the blueworlders' technological and informational systems. One notable document, Pathways to Exploration makes clear the disarray in which the blueworlders' long-term invasion plans lie, drawing on the history of meat-controlled spaceflight to justify future programs in organic space exploitation. Although the report promotes the invasion of our world as the horizon goal for the program, it takes into account funding levels necessary to maintain a robust tempo of execution, current research and exploration projects and the time/resources needed to continue them, and intertribal cooperation that would be required to further oppress the citizens of our fair red world."
"And its conclusion? Although the mechanized threat remains, and we salute those still fighting pitched battles with the two active land-based invaders, Pathways to Exploration makes it clear that it is not possible for the blueworlders' organic-based self-replicators to invade our world, at least not without a sustained commitment to funding at a higher level than their own tribal leaders are currently providing."
When an intern from the defense engineering board suggested that improving the capabilities of the blueworlders' EDL systems, radshielding, and propulsion and power systems were ultimately matters of engineering and not physics, and could ultimately be addressed if the tribals of the blue world ever get it into their oxygen-addled brains to work together to achieve a common goal (as, the intern suggested, the way any sentient species does), K'Breel had the intern's gelsacs addled by immersing them in a suitably-merciful quantity of liquid oxygen.
Thus spake K'Breel, Speaker for the Council of Elders, Committee on Native Spaceflight; Arenautics and Defense Engineering Board; Defense Studies Board; Division of Blueworlder Social and Physical Sciences; Committee on Gelsacular Statistics.
Link to Original Source
I kept thinking "I am the very model of a modern Major Perl Framework..."
I am the very model of a modern Major Perl Framework,
But here I am on Slashdot, trying harder from my job to shirk,
From HackerNews to 4chan there's no forum in which I won't lurk,
I am the very model of a modern Major Perl Framework!