Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Hashes list link (Score 1) 271

Also, forgot to mention, isn't the implication of some cracked / some non cracked that whoever originally got their hands on the data only has the hashes, not the full passwords?

Of course, it's also possible that some scavenger started cracking the SHA-1 hashes in a file that someone else released...

Comment Re:They skipped IE support on their ADMIN pages (Score 1) 273

Only it isn't. ...

"'jQuery', he mumbled". Well stop mumbling, either make with the argument (and the CODE), or shut the fuck up already. Show me the code that hooks the flag up to an action ... it's just not there.

Yes it is. Right here in the script.

jQuery(document).ready(
    function(){
        $('.commentSub .ui-icon.flag').live('click',
            function(fe){
                if($('#flag_comment').length>0){
                    $('#flag_comment').remove();
                }
                $(this).parent().append('<form id="flag_comment"><input type="hidden" name="comment" value="'+this.id+'"><input type="button" class="s" value="Report" disabled="disabled" onclick="reportCommentAbuse();"><input type="text" name="reason" class="t" placeholder="Specify reason" ></form>').parent().parent().addClass('flag-in');
                $('input[name=reason]').focus();
            }
        );
        $(".comment").hover(function(){},
            function(){
                if($(this).hasClass('flag-in')){
                    $('#flag_comment').remove();
                    $(this).removeClass('flag-in');
                }
            }
        );
        $("input[name=reason]").live('keypress',
            function(kp){
                var code=(kp.keyCode?kp.keyCode:kp.which);
                if(code==13){
                    $(this).prev().trigger('click');
                    kp.preventDefault();
                }
            }
        );
        $("#flag_comment .t").live('keyup',
            function(data){
                if($(this).val()!=""){
                    $("#flag_comment .s").removeAttr("disabled");
                }else{
                    $("#flag_comment .s").attr("disabled","disabled");
                }
            }
        );
    }
);
function reportCommentAbuse(){
    ajax_update(
        {
            op:'reportCommentAbuse',
            comment:$("#flag_comment input[name=comment]").val(),
            reason:$("#flag_comment input[name=reason]").val()
        },
        '',
        {
            onComplete:function(){
                Slash.busy('modal-fetch',false);
                $("#flag_comment").hide();
            }
        }
    );
    return false;
}

Comment Re:Cool tech, but (Score 1) 333

That pixel-sized image is just a server-side script that logs some metrics based on the request the browser sent. It could send back a 404 error instead of a 1x1 transparent gif - it wouldn't matter. And it doesn't have to be an image; it could just as easily be a script or style tag, and the server sends back a 0-byte file after logging the request.

Comment Re:(Self-replying, I apologize) (Score 1) 216

If somebody can impersonate your peer at that exchange, you are owned.

It would get them nowhere, on its own. They would also need to intercept the entangled photon, without detection - which can't be done (in theory); that photon would simply be ignored, not used for the encryption.

It's basically like you're doing XOR encryption with a random one-time pad, known only to you and your target. The quantum encryption is basically the part that ensures that only you and your target can possibly know what the one-time pad contains (according to present interpretation of the laws of physics). Because any time your eavesdropper intercepts a single bit of the one-time pad, both of you are able to sense this and simply not use that bit.

Comment Re:Security though overlooking the obvious - (Score 1) 216

Not the exact same thing - quoting from the paper,

Most recently, following a modified scheme, quantum teleportation over 16 km free-space links was demonstrated with a single pair of entangled photons. However, in this experiment, the unknown quantum state must be prepared on one of the resource entangled qubits and therefore cannot be presented independently. In our experiment, we demonstrate quantum teleportation of an independent unknown state...

Comment Re:Security though overlooking the obvious - (Score 1) 216

It's not really known whether or not Bob's photon actually changes, or whether it's simply been in the same state as Alice's photon all along. If it changes that would imply that the information moved faster than the speed of light, which poses problems under current models. If it's been that way all along, the only thing that changes is that Alice now knows what state it's in.

In either case, Alice can tell Bob which quantum operation to perform on the entangled photon to determine the state of Alice's original photon. Intercepting this would tell you nothing unless you have one of the entangled photons, since the state of Alice's entangled photon is assumed to be random when she measures it. Bob's entangled photon has the same quantum state as Alice's does, and when he performs the correct operation, he finds the state of the original qubit.

I assume there must be some way to determine whether both Alice and Bob have an entangled pair of photons before Alice transmits which transformation Bob should use. Otherwise, it seems like someone could intercept an entangled photon intended for Bob and also intercept the transmission where Alice reveals which transformation will yield the encoded qubit.

Comment Re:Security though overlooking the obvious - (Score 1) 216

Well, I went ahead and downloaded the PDF (surprisingly not paywalled).

It describes it as (paraphrasing slightly):

Alice has a photon of unknown quantum state and wishes to transfer it to Bob, who is at a distant location. Charlie first distributes an entangled photon pair to Alice and Bob, respectively. Alice now has two photons, and performs a joint Bell-state measurement (BSM) on them. The state of Bob's entangled photon is instantaneously altered by Alice's measurement. Alice then transmits the BSM result (meaningless on its own) to Bob via a classical channel. Based on this result, Bob can apply the appropriate unitary transformation which will convert the state of his entangled photon into the original state of the unknown photon.

So it sounds like the information is not teleported until Bob and Alice have successfully received a pair of entangled photons. Losses simply interfere with Bob's ability to receive entangled photons (Charlie and Alice are in the same physical location).

Comment Re:Security though overlooking the obvious - (Score 1) 216

Conventional lasers use a beam consisting of millions of photons, and some percentage of them have to reach the destination. In the quantum version, individual photons are transmitted, and all must reach the destination, or both transmitter and receiver will know that the secure link has been broken. Additionally, it's theoretically impossible to eavesdrop without either breaking the quantum entanglement, or blocking the photon (or both). Either way, both parties will detect it.

Comment (Self-replying, I apologize) (Score 5, Informative) 216

Note that it's still limited by the speed of light. The key feature, however, is that it is secure: someone intercepting the photon can't copy or read its qbit state without breaking the quantum entanglement, or preventing it from reaching the destination. In either case, the receiver will immediately know that the channel has been broken. It then stops transmitting a response to the sender, and the sender perceives this as also a break in secure communications and stops transmitting. Both the sender and the receiver would then go into failure mode and send query/response polls periodically. When secure communications are re-established, they can resume transmitting data.

Slashdot Top Deals

Kleeneness is next to Godelness.

Working...