Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment: Hate to rain on your parade (Score 1) 216 216

I fail to see how Bitcoin is private and confidential. All the transactions are public (inherently by design). And if you buy bitcoins somewhere with your CC or paypal or bank, it is possible to link the bitcoins to your name.

If you buy them with cash, you could as well buy one of those cash coupons that porn sites might accept too. Then, you gain TRUE anonymity and, as a bonus, you and the seller avoid the massive volatility of the currency (100x decrease/increase in value over a day).

Comment: Ok (Score 4, Insightful) 80 80

Just, please, this time, try to be more careful about who joins your working groups. And especially what their true intentions are.

Sometimes when someone tries to "simplify deployment" or "offers insight to prevent user confusion", etc., you may want to think twice. History repeats itself, you know.

Comment: All right (Score 2, Insightful) 257 257

Only an idiot would run a browser on an OS with unpatched vulnerabilities. Windows XP will not get any security issues fixed after April 2014. If you ignore those simple facts, you deserve becoming a part of a botnet, sending your passwords and credit card numbers to the botmaster.

Comment: Very informative piece of info at the bottom (Score 5, Informative) 246 246

A very interesting piece of info is at the bottom of TFA:

since readers were allowed to make comments without registering their names, the identity of the authors would have been extremely difficult to establish. Making Delfi legally responsible for the comments was therefore practical, said the court. It was also reasonable, because the news portal received commercial benefit from comments being made.

Comment: Uninformed nonsense (Score 1, Flamebait) 169 169

The guy calls himself cryptographer, but he doesn't know what he's talking about.

Hashes, and also any ideal random oracles, have only (n/2) security due to so called birthday paradox limit.

That's why SHA-512 has only 256-bit security. This is not weakening of the hash in any form. It is a property of any hash or RNG.

What the slides show is that they want to reduce clutter in reducing dozen options into two options. One high-security (256-bit security) and another fast, medium-security.

Reality must take precedence over public relations, for Mother Nature cannot be fooled. -- R.P. Feynman

Working...