Forgot your password?
typodupeerror

Comment: Re: Why? (Score 1) 96

by phantomfive (#48193113) Attached to: China Staging a Nationwide Attack On iCloud and Microsoft Accounts

The CCP knows they are living on borrowed time and are going to do everything in their power, including perhaps returning to the days of the cultural revolution if it finds it necessary.

The CCP uses fear of the cultural revolution as a way to stay in power. That's what all the talk about 'Harmony' means. Not many people in China want to go back to that. They understand it made no sense to have red stoplights mean go,for example.

Comment: My infringement warning notice (Score 0) 100

The code is implemented for people to be able to play with an insecure algorithm, to test it's weaknesses. If I were the author of the library, I would have added a warning like this:

This code is known insecure. If you ship on a real device to customers, you are such a moron that........imagine every insult Linus Torvalds has ever spoken or written, and that it applied to you. Would you want that? That's what would be the case if you used this in production code.
Furthermore, even if you're the dumbest person on earth, shipping this code on real devices could expose you to threats of lawsuits. I don't know if those threats are real, but don't let it get to that point.

Comment: Patent infringement (Score 5, Informative) 100

He is not being threatened for copyright infringement, he's being warned about patent infringement. Here is the link to the patent in question (there's also a European patent). Furthermore, it seems the lawyers have determined that he has not committed infringement himself, but users of his library may use it to infringe. Therefore, the letter does not even threaten any legal action at all. It's just a friendly request.....or as friendly as lawyers ever get.

Below I will paste the specific patent's independent claims. I don't think this can actually cover generic software written for the PC, because of the 'secret memory' and the fact that they have patented the device implemented in hardware, not a software implementation of the algorithm (and how many computers actually have a pseudo-random shift register?)

1. Method of producing an authentication code (CA), comprising cycles for reading binary words (Mn) out of a secret memory (21) comprising a plurality of binary words, wherein, at each cycle, the address for reading a word out of the secret memory (21) is generated from an address generating binary word (GA) forming the result of a combination operation (Fc, ) of words (M1 to Mn) read out of the memory during previous cycles, characterised in that it comprises a transform operation of the address generating word (GA) consisting in logically combining at least one bit (g'0, g'1, g'2) of the address generating word (GA) with at least one bit (r1, r4, r6) of a pseudo-random shift register (26).

8. Logic machine (20, 20-1, 30) clocked by a clock signal (H), comprising a secret memory (21) in which a plurality of binary words read out at clock rate are stored, wherein the output of the memory (21) is applied to a first input (A) of a logic circuit (22) whose output (C) is fed back to the second input (B), the logic circuit (22) performing a combination (Fc, "+") of its two inputs (A, B) and producing an address generating binary word (GA) supplied to the address input (ADR) of the memory, characterised in that it comprises a pseudo-random shift register (26) and logic means (25-1, 27) for combining at least one bit (r1, r4, r6) of the shift register (26) with at least one bit (g'0, g'1, g'2) of the address generating word (GA).

Comment: Re:do one thing and do it well (Score 5, Insightful) 137

by phantomfive (#48191709) Attached to: GNU Emacs 24.4 Released Today

I'm shocked (shorting out usb ports need fixing) I haven't seen this posted... I guess if it doesn't say systemd that rhetoric doesn't apply.

Because the people who don't like emacs don't use it. No one builds software with emacs as a dependency and then tried to get every Linux environment to use it as a core dependency.

Emacs is a good citizen. It is cross-platform, stable, and easily replaceable. Unlike it-that-must-not-be-named.

Comment: Re:A rather empty threat (Score 1) 459

by phantomfive (#48190495) Attached to: Debian's Systemd Adoption Inspires Threat of Fork
Yes, bugs are a problem, but that's not what you said. You said it is bad because they haven't had a release in five years.

That shows a huge problem in your understanding of system design, which you should fix now or continue making poor systems. Stability in a core system component is a good thing, not a bad thing. Don't forget it and your code will be better.

Those who do things in a noble spirit of self-sacrifice are to be avoided at all costs. -- N. Alexander.

Working...