Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
For the out-of-band Slashdot experience (mostly headlines), follow us on Twitter, or Facebook. ×

Comment: Re:Anonymity (Score 1) 258 258

Not if the key is the public key of the current user account using resources on the server. Again, I'm out of my field of expertise, but it sounds like something feasible.

The terminal would be the only unencrypted part of the process, a terminal that could be anything ranging from another computer to a screen. All you have to do is to plug your hardware stored keychain to a screen with no data connection (expected encrypted video signal) to the server to get the unencrypted output.

That's going far, but that looks like a nice objective that could start with a processor that would allow a part of it.

Comment: Anonymity (Score 1) 258 258

I may be way out of my field of expertise here, but I remember a nice trick that allowed to get information back from a live encrypted system by freezing the RAM .

It would be quite nice to have a end to end internally encrypted system. This kind of hack does not make a lot of sense from a personal use point of view, but when using a server, yes.

Comment: Re:This makes perfect sense (Score 1) 388 388

I think you overestimating the knowledge legislators have of the hacker world, as well as the irony of my comment. I'm a firm believer in "curing" criminals instead of punishing them.

I'm sure we can argue back and forth on the "good" or "bad" intrinsic nature of the human beings. From an evolutionist point of view "good" behavior (not in a moral way but in a rational way) within a group being the norm, and bad behavior being the anomaly, makes more sense than the opposite. ...or maybe the "hope" I'm exhibiting is biased by evolution as well...

P.S.: Comment not applicable to large entities such as states. See for more information on this exception.

I have not yet begun to byte!