Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:A live example (Score 1) 169

I believe it is intended that you came up with those associations yourself,.
So when presented with the list of your past answers and the same group of pictures, you will be able to do it again.
Trying to reverse another persons association-list will be much harder (and that is kind of the point here i guess).

Comment Re:This (Score 1) 462

And if someone said 'I did that at 13:00' the information is completely useless unless you also know where on the planet that person was at the time.
But at least you know that at that unknown point in time, the sun was up and it was right after lunch...

Comment Re:...including some placed by people... (Score 3, Insightful) 330

You only have to adjust your definition of 'terrorist comnnections'.

For the NSA, an Nth degree connection is most likely enough.
As in: your number has in the past called some number, that was also called by a number which had been in contact with a number which is suspected to have once been used by someone who's name is on one of their lists.
This kind of 'meta-information' is exactly what they are fishing for after all.

I am more interested in how they got 'some' with no terrorist connections. Maybe only brand new phone numbers on their first use?

Comment Re:Paranoia (Score 1) 303

I don't see how this is paranoia.
I wouldn't use the same password for my phone and my banking acount. But the fact you can't change your fingerprints pretty much forces you to.
Worse, you will use the same print in the future, forever.

So how long is that password going to last, with all the regular leaks, phone-malware and whatnot? How many years?
If any single application you gave the fingerprint to has a security hole, just one of them, then all other are immedeately compromised. And there is no way you can change that, even if you knew it happened.

And the best part is, because the 'password' is so strongly linked to your person, everyone who got it can easily figure out which other locks it might open for them, other than your phone.

Lastly, the argument of 'the xyz could do it if they really wanted' is just a bad one and I'm sick of hearing it.
This is still a question of economics.
Sure there could be agents following everyone around, grabbing fingerprints from the used glasses in restaurants and so on... would only cost like a trillion dollars until we have all the data.
Or we have them all upload their prints to their phones, which we already have backdoors into anyway, so it costs one of our IT people 10 minutes to issue the download command.
One thing will never happen, the other is more than likely.

Slashdot Top Deals

If all else fails, lower your standards.

Working...