Forgot your password?
typodupeerror
PHP

+ - Crowd Fusion, a new open source unified blog/wiki ->

Submitted by mollyhackit
mollyhackit (693979) writes "Crowd Fusion, a new framework with plugin architecture utilizing Inversion of Control and including a set of plugins that create a CMS, is going open source according to an announcement at TechCrunch 50 and post on the company's blog from its CEO Brian Alvey (who previously built the platform that powered Weblogs, Inc. and is quoted in this previous Slashdot story): "...our framework (code named Sprung) and the Crowd Fusion CMS are being released as an open source project. For the next two months we'll be taking beta registrations in preparation for a full public rollout." TechCrunch notes that "the platform helps streamline content writing, database management, and social features by combining features of blogs, wikis, and more into one unified platform." Additionally, the full video of the TechCrunch 50 announcement is available on Ustream, a more detailed tour of the platform shot before the open source announcement has been posted by Robert Scoble, and Crowd Fusion CTO Craig Wood has gone into some technical details about the platform on his blog. Overall, it looks to be a potentially powerful new contender in the open source arena..."
Link to Original Source

Comment: Cold boot team responds (Score 1) 260

by mollyhackit (#26511431) Attached to: Solution Against Cold Boot Attack In the Making
Hack a Day asked cold boot team member Jacob Appelbaum what he thought of the approach.

Here's Jake's unedited response:

Yeah, it's not a solution. It simply seeks to make it more obscure but an attacker would certainly still be able to pull off the attack.

From what is on that blog, there's still a full keyschedule in memory at this time. This is how we reconstruct the key, the redundant information in memory; it's not just the 128/256 bit key itself. For older methods, they needed the actual specific key bits but we don't need them because we recreate them.

Basically, the CPU is acting as a ghetto crypto co-processer. Emphasis on ghetto. It's a nice suggestion but the devil is in the details and sadly the details in this case aren't really up to snuff. It's a bogus solution.

"Though a program be but three lines long, someday it will have to be maintained." -- The Tao of Programming

Working...