Follow Slashdot stories on Twitter


Forgot your password?
Slashdot Deals: Deal of the Day - Pay What You Want for the Learn to Code Bundle, includes AngularJS, Python, HTML5, Ruby, and more. ×

Comment Re:Anonymity (Score 1) 258

Not if the key is the public key of the current user account using resources on the server. Again, I'm out of my field of expertise, but it sounds like something feasible.

The terminal would be the only unencrypted part of the process, a terminal that could be anything ranging from another computer to a screen. All you have to do is to plug your hardware stored keychain to a screen with no data connection (expected encrypted video signal) to the server to get the unencrypted output.

That's going far, but that looks like a nice objective that could start with a processor that would allow a part of it.

Comment Anonymity (Score 1) 258

I may be way out of my field of expertise here, but I remember a nice trick that allowed to get information back from a live encrypted system by freezing the RAM .

It would be quite nice to have a end to end internally encrypted system. This kind of hack does not make a lot of sense from a personal use point of view, but when using a server, yes.

Comment Re:This makes perfect sense (Score 1) 388

I think you overestimating the knowledge legislators have of the hacker world, as well as the irony of my comment. I'm a firm believer in "curing" criminals instead of punishing them.

I'm sure we can argue back and forth on the "good" or "bad" intrinsic nature of the human beings. From an evolutionist point of view "good" behavior (not in a moral way but in a rational way) within a group being the norm, and bad behavior being the anomaly, makes more sense than the opposite. ...or maybe the "hope" I'm exhibiting is biased by evolution as well...

P.S.: Comment not applicable to large entities such as states. See for more information on this exception.

One picture is worth 128K words.