Forgot your password?
typodupeerror

Comment: Re:Simple. (Score 1) 876

by pipatron (#46193649) Attached to: Ask Slashdot: Why Are We Still Writing Text-Based Code?

Actually, they are called movies. And I bet that on average, people watch a lot more movies than they read books.

(This is however not a statement of quality, and I guess there are hundreds of nerds who thinks that anectodes equals data which will reply to this and proudly proclaim that they read more books than they watch movies.)

Comment: Re:Doesn't Scale (Score 1) 876

by pipatron (#46193635) Attached to: Ask Slashdot: Why Are We Still Writing Text-Based Code?

Trial and error is usually required to see if a box responds to a message in the way you want; I can write correct C without having to run the code, I would never try that in Reaktor.

Now that's a brave statement!

I'm always suspicious when that actually happens. Which bugs have I missed?

Comment: Re:Officials learn terrorist and criminals use cas (Score 1) 411

by pipatron (#45052691) Attached to: US Intelligence Chief Defends Attempts To Break Tor

You only need to do that here (Sweden) if you want to deposit large enough sums, I don't know exactly how much should be a couple of thousands of your so-called quids.

I expect this to gradually change within the next 10 years or so, though. I mean, handling cash in this day is suspicious enough when you might as well use a debit or credit card of some sorts, or pay with your phone bill.

Comment: Re:Officials learn terrorist and criminals use cas (Score 3, Interesting) 411

by pipatron (#45050237) Attached to: US Intelligence Chief Defends Attempts To Break Tor

Actually, a better "analogy" is that they work hard on making sure that cash can't be used anonymously. Each transaction must be monitored (serial numbers on every bill, cameras in every ATM and store), and controlled (demanding proof of ownership for depositing cash at a bank, removing the possibility to actually use cash for buying travel documents).

Much like they are working hard on trying to make sure Tor can't be used anonymously.

Comment: Re:How about the nodes (Score 5, Interesting) 234

by pipatron (#45037603) Attached to: How The NSA Targets Tor

Interesting. If I worked for NSA, I would try to. It would give some more information. Though on the other hand, they may just as well run their own nodes to get that information (oh yes, they do this already), and hacking 'normal' people just for the lulz always increases the chance of information about your operations getting out.

In short: It would be stupid to hack you just because you're running a node, unless you're their target in some other way.

Comment: Re:Ehhh... (Score 1) 234

by pipatron (#45037485) Attached to: How The NSA Targets Tor
I think it's because Snowden didn't release it all, like Manning, but just released a small part of it, and only to a newspaper. He claimed to have his reasons for this, not that I agree with them. Something about how the Manning files identified some people, and that Snowden didn't want that to happen.

Comment: Re:Dichotomy (Score 1) 234

by pipatron (#45037387) Attached to: How The NSA Targets Tor

Of course they are watching exit nodes. Everybody should assume they do (also the person running the node will watch, and that person's ISP).

However, I have never heard anyone claiming they can tie the traffic back by watching the traffic, other by the well know timing attacks that they *do* talk about in the article. Basically, they see some traffic exit the node at the same time as they see similar traffic at some completely unrelated place in the network, building up statistics which can identify a suspect over time. This is why they say they have limited success.

Time is an illusion perpetrated by the manufacturers of space.

Working...