Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Submission + - Ask Slashdot: After TrueCrypt (slashdot.org)

TechForensics writes: (Resubmitted because was not identified as "Ask Slashdot"

We all know the TrueCrypt story-- a fine, effective encryption program beginning to achieve wide use. When you see how the national security agency modified this tool so they could easily overcome it, you'll probably understand why they don't complain about PGP anymore. The slip that showed what was happening was the information that NSA "were really ticked about TrueCrypt" either because they couldn't circumvent it or found it too difficult. From the standpoint of privacy advocates, NSA's dislike for TrueCrypt was evidence it was effective.

Next, NSA directly wrapped up the makers of TrueCrypt in legal webs that made them insert an NSA backdoor and forbade them from revealing it was there. It's only because of the cleverness of the TrueCrypt makers the world was able to determine for itself that TrueCrypt was now compromised. (Among other things, though formerly staunch privacy advocates, the makers discontinued development of TrueCrypt and recommended something like Microsoft Bitlocker, which no one with any sense believes could be NSA – hostile. It then became logically defensible, since NSA was not complaining about PGP or other encryption programs, to posit they had already been compromised.

This is the situation we have: all of the main are important encryption programs are compromised at least in use against the federal government. Whether NSA tools are made available to local law enforcement is not known. This all begs the question:

Does the public now have *any* encryption that works? Even if we can see the source code of the encryption algorithm the source code of the program employing that algorithm must be considered false. (TrueCrypt was the only program NSA complained about.) In the case of other software, it becomes believable the NSA has allowed to be published only source code that hides their changes, and the only way around that may be to check and compile the published code yourself. Half the public probably doesn't bother.

Okay, Slashdot, what do you think? Where do we stand? And what ought we to do about it?We all know the TrueCrypt story-- a fine, effective encryption program beginning to achieve wide use. When you see how the national security agency modified this tool so they could easily overcome it, you'll probably understand why they don't complain about PGP anymore. The slip that showed what was happening was the information that NSA "were really ticked about TrueCrypt" either because they couldn't circumvent it or found it too difficult. From the standpoint of privacy advocates, NSA's dislike for TrueCrypt was evidence it was effective.

Next, NSA directly wrapped up the makers of TrueCrypt in legal webs that made them insert an NSA backdoor and forbade them from revealing it was there. It's only because of the cleverness of the TrueCrypt makers the world was able to determine for itself that TrueCrypt was now compromised. (Among other things, though formerly staunch privacy advocates, the makers discontinued development of TrueCrypt and recommended something like Microsoft Bitlocker, which no one with any sense believes could be NSA–hostile. It then became logically defensible, since NSA was not complaining about PGP or other encryption programs, to posit they had already been vitiated.

This is the situation we have: all of the main or important encryption programs are compromised at least in use against the federal government. Whether NSA tools are made available to local law enforcement is not known. This all begs the question:

Does the public now have *any* encryption that works? Even if we can see the source code of the encryption algorithm the source code of the program employing that algorithm must be considered tainted. (TrueCrypt was the only program NSA complained about.) In the case of other software, it becomes believable the NSA has allowed to be published only source code that hides their changes, and the only way around that may be to check and compile the published code yourself. Half the public probably doesn't bother. (Would it not be possible for the NSA to create a second TrueCrypt that has the same hash value as the original?)

Okay, Slashdot, what do you think? Where do we stand? And what ought we to do about it?

Submission + - 3D Space Epic Game Released on Linux (salvationprophecy.com)

An anonymous reader writes: Salvation Prophecy has space ship dog-fights, planetary battles, alien planets to explore, and a command room to order new colonies, space stations, and military attacks. The linux port is solid, and supports full screen, a variety of input devices (keyboard-mouse, joystick, gamepad), and plays really smooth on any reasonably modern mid-level video card.
Security

Submission + - Ask Slashdot:How to protect a text document 6

Jason1729 writes: I have been ordered by judge to release a large amount of material in "electronic format". Typically it's only available as paper copies which are sold on copy protected paper. Illegal copying of this material has become rampant and a group of lawyers obtained the court order by claiming it would be easier for them to access the material on a computer screen rather than hard copy. It is fairly clear they intend to print and share the single copy rather than paying for certified copies.

I'm looking for a technological solution that will allow me to distribute the documents (with word processing formatting in tact), in "electronic format", complying with the letter of the court order, but also make it impossible or as difficult as possible to print the documents or share the electronic version.

I'd rather not get into a discussion on the morality of copyright as the cost to produce the material was far greater than the single copy price and had I known I'd be facing this court order, I'd have refused to create it to begin with. Total demand is around 5 copies and getting 20% of that means losing a lot of money.

Submission + - Computer Repair Company Takes Revenge on Devious Customer (callnerds.com) 3

herrshuster writes: Nerds on call, a small computer repair company, was sued for $500,000 dollars by a customer claiming that they had lost critical information in his litigation. But when they looked into his history, they found this was not the first time he had tried to get money from a company through either his own error or ignorance: http://blog.oregonlive.com/complaintdesk/2011/07/when_store_clerks_give_advice.html In retaliation, they posted an explanation of the circumstances on their site that totalled more than 17,000 words in an attempt to google-bomb his name. Their closing statement: "In the end we won’t label him a scam artist, or assume he had nefarious intent, however, we will let the entire history of our interactions with him stand on their own."
Censorship

Submission + - article critical of Microsoft pulled from forbes.com (googleusercontent.com)

darkeye writes: An article titled 'Sell Microsoft NOW! Game Over — Ballmer Loses' (http://www.forbes.com/sites/adamhartung/2013/01/20/sell-microsoft-now-game-over-ballmer-loses/) by Adam Hartung has been pulled from forbes.com. The article is still available via the Google WebCache here: http://webcache.googleusercontent.com/search?q=cache:Z07qoZSJTV8J:www.forbes.com/sites/adamhartung/2013/01/20/sell-microsoft-now-game-over-ballmer-loses/
  . While Microsoft is clearly on the decline, it seems it still has for enough reaching hands to sensor content on a major publication like Forbes.

Submission + - Read rights contracts carefully! (phoenixnewtimes.com)

Grayhand writes: A young video maker found out the hard way that signing a contract for his videos could have lifetime repercussions. A contract with Machinima forced him to abandon video making for life. Be warned it's becoming the standard for contracts.
Businesses

Submission + - How corruption is strangling US Innovation (hbr.org) 1

hype7 writes: "The Harvard Business Review is running a very interesting piece on how money in politics is having a deleterious effect on US innovation. From the article:

if you were in any doubt how deep inside the political system the system of contributions have allowed incumbents to insert their hands, take a look at what happened when the Republican Study Committee released a paper pointing out some of the problems with current copyright regime. The debate was stifled within 24 hours. And just for good measure, Rep Marsha Blackburn, whose district abuts Nashville and who received more money from the music industry than any other Republican congressional candidate, apparently had the author of the study, Derek Khanna, fired. Sure, debate around policy is important, but it's clearly not as important as raising campaign funds.

"

Input Devices

Submission + - Razer Mouse Crippled Without Online Activation

jones_supa writes: At Overclock.net forums, nickname channelx99 tells a story about a frustrating obstacle when he begun to use a Razer Naga mouse. A software is required to enable the full functionality of the mouse. The user was greeted by a login screen which couldn't be bypassed, and even worse, the account creation didn't work at the time. It turned out that the Razor activation server was down. As result, channelx99 was left out in the cold, and he wraps up 'Nowhere on the box does it say anything about needing an internet connection to "activate" a mouse. If the servers go down in the future, anyone who buys this mouse is out of luck.'
DRM

Submission + - Outlawed by Amazon DRM (bekkelund.net)

Pelekophori writes: From the article:

"A couple of days a go, my friend Linn sent me an e-mail, being very frustrated: Amazon just closed her account and wiped her Kindle. Without notice. Without explanation."

Piracy

Submission + - Heavy metal band does not support label's decision to prosecute pirates (icedearth.com)

hessian writes: "“It has come to my attention that Century Media is suing fans over illegal downloads of (among others) our latest album ‘Dystopia’. I felt it was important to clarify that we had no knowledge of this motion and were, sadly, not asked permission.

  We all know the music industry is changing. We have been adapting to this model by embracing legal streaming services such as Spotify and by bringing our music to places we have never played before by touring our proverbial asses off.

  As much as we respect that the labels are having a harder time selling music, we feel this is a misguided effort and want to make sure our fans know we would have not given our consent would we have been asked.”"

Censorship

Submission + - BT Blocks Disabled Rights Site? (techweekeurope.co.uk) 2

judgecorp writes: "BT has blocked access to the Black Triangle disabled rights website according to activists. BT has confirmed there is a problem, but won't give any details on why it is not available to any BT subscribers. Black Triangle is campaigning against Atos Healthcare which is applying government rules on entitlement to disability benefits — and which has previously shut down critical websites and forums."

Comment Re:refreshing! (Score 1) 115

Actually what's more refreshing is that for a change, a foreign court was granted jurisdiction in America, rather than the other way around. And no-one got to be deported in the process!

i dunno, throwing in a few deportees in the other direction might help bring about a sense of proportion about the merits of copyright law uber alles.

DRM

Submission + - Ubisoft Games Won't Work Next Week (itproportal.com) 2

hypnosec writes: Several of Ubisoft's biggest titles won't be playable as of next week thanks to a server move by the publisher and the restrictive DRM that was used in their development. This isn't just multiplayer either. Because Ubisoft thought it would be a smart plan to use always on DRM for even the single player portion of games like Assassin's Creed, even the single player portion of that title won't be playable during the server move. Some of the other games affected by this move will be Tom Clancy's HAWX 2, Might & Magic: Heroes 6 and The Settlers 7. The Mac games that will be broken during this period are Assassin's Creed, Splinter Cell Conviction and The Settlers. This move was announced this week as part of a community letter, with Ubisoft describing how the data servers for many of the publisher's online services would be migrated from third party facilities to a new location starting on the 7th February. The publisher didn't reveal how long the transfer would take.

Slashdot Top Deals

It is easier to write an incorrect program than understand a correct one.

Working...