Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:The real issue: U.S. government corruption. (Score 2) 555

I happen to be an expert on the use of cryptography.

The point you forgot to mention is that encrypted files are easily spotted by analyzing the entropy of the decrypted disk blocks. That's why hidden containers WILL often stand out like a sore thumb. And this is precisely the reason why Truecrypt is just a poor tool at steganography.

Ah, no. TrueCrypt overwrites the whole primary encrypted partition with cryptographically generated randomness, i.e. every sector in there already has high entropy and that remains true for never used (!) sectors after decryption. For a hidden container, it places a header-less secondary container within the primary one at an offset. That container is only identifiable if you have its passphrase. So no, entropy analysis does not help.

There is another problem though: Writing to the primary encrypted container can damage the secondary one. For this, TrueCrypt protects an opened secondary container by intercepting writes to the primary one and blocking them if they would go into the secondary one. That leaves traces. Also, you will always see that there is a (more-or-less) large part of the primary encrypted partition that does not have files in it. If a FAT/NTFS filesystem is new, it is normal that no data is stored towards the end of the partition, as they both cluster data at the start. When it gets older, the used area wanders towards the end though. (These filesystems try to overwrite deleted data as late as possible to allow recovery, in contrary to typical UNIX/Linux filesystems that just use the whole disk. One reason UNIX/Linux filesystems have significantly better performance.) Now if the used area wanders, at some point it will either damage the secondary (hidden) encrypted partition, or the write restrictions become obvious. If you just do not write to the primary encrypted partition, that also is obvious.

Hence, a TrueCrypt hidden partition can be glaringly obvious unless you are careful and use it right. Basically, you have to create the whole set-up a short time before crossing that border.

However, unlike Truecrypt, some encrypting file systems do an excellent job at hiding data in a much more effective way. Of course, using such an OS/Filesystem combo is in itself a dead giveaway that you've got something to hide. So your point has merit still.

Indeed. However, I am not aware of encrypting filesystems that do a better job. Hiding data is just not something that encryption can do well. What it can do is provide access control. But as soon as they can force you to hand over the privileges (keys in this case), access control is meaningless.

Comment Re:The real issue: U.S. government corruption. (Score 1) 555

Here is the thing.

If they want to arrest you, or beat you, they can and will do it anyway for looking suspicious. Encryption is not a magic bullet, no one component is.

Very true. Yet people keep believing that TrueCrypt hidden partitions make them invulnerable. I am merely pointing out that this is decidedly no so.

Comment Re:TV addiction? (Score 1) 89

How come there is no treatment for TV addiction? ... Or feeding yourself 8 hours of programme a day is considered normal?

From people I talk to, watching 3-4 hours a day is considered very normal. They eat dinner, load the dishwasher, then sit down and tune in until it's bed time. I don't understand where they get they get this time. It's not a matter, even, of if they are going to watch TV - they'll even watch it while complaining "there's not much on tonight that's very good".

There are very good reasons for some people to enjoy the status quo of a "fat & happy" populous, but the medical community ought to recognize this kind of behavior as harmful.

Submission + - Twinkind Takes the Ultimate 'Selfie', a 3-D Model of Yourself (wsj.com)

pbahra writes: It is, perhaps, the ultimate “selfie”—a self-portrait snapped with a digital camera. But why be content with taking a picture of yourself, what about a three-dimensional miniature model of yourself reproduced in unnerving accuracy? A German startup is offering just that.

Customers of Twinkind can get a 3-D figurine ranging in size from around 15cm (6) to 35cm and costing between €225 ($297) and €1,290.

The process starts with capturing your likeness in the company’s offices in Hamburg. According to Mr. Schaedel, over 100 images taken from all angles are shot in a fraction of a second using technology designed by Twinkind.

Comment Re:Why was this even posted? (Score 2) 141

From the article:

It is queried for phone numbers of interest mainly using what are called “administrative subpoenas,” those issued not by a grand jury or a judge but by a federal agency, in this case the D.E.A.

In other words, no, there's no oversight. The DEA issues its own legal requests. The AT&T "contractors" who issue the queries sit next to the agents and are paid for by the DEA (in other words, they're employees of the government). Elsewhere the presentation makes a reference to routing requests via Washington state which somehow converts them into court orders, not sure what that's about.

Also, the presentation tells agents to cover up the fact that it exists and how to do so, so we're back into "parallel reconstruction" terroritory.

That said, I actually care less about this sort of thing than what the NSA is doing, as it's (a) not classified and apparently can be learned about via the regular channels despite their requests for secrecy and (b) it's being used to catch more ordinary, every day criminals like people who rob jewellery shops or make bomb threats. The almost total blurring between corporation and state is very concerning because it implies there's nothing stopping it from stepping over the line and becoming used for petty political activism or worse, but at least they try to actually justify the programs existence with examples (unlike nearly all NSA training material, it seems).

Comment Re:Disclaimer (Score 1) 141

Not only that, but actually current cell-site data for any phone is publicly available for a small fee (1 cent). The GSM Home Location Register is a worldwide database which all carriers need access to for roaming to work, the fact that somehow some companies are able to sell access to it perhaps should not really surprise anyone. What you get back are cell tower IDs, not co-ordinates, but I guess it may be possible to build a map of tower IDs to physical locations (or obtain one) if you're determined enough. For many uses it's not even that hard, as you don't need all of them but just the small set of locations where you expect your target is likely to be.

I guess the next step for drug dealers and other people who don't want to carry a portable tracking device would be to use VoIP via VPNs or other proxy services. I anticipate that over time proxying traffic will become illegal ("packet laundering" anyone?). No way are governments going to give up this wonderful gift society gave them in the form of knowing everyones location, all the time.

Submission + - Woman with cancer, re-implanted with ovarian tissue, is pregnant with twins. (abc.net.au)

brindafella writes: A world first! When Australian woman, Vali, was diagnosed with cancer, and treated, she was not looking at a good outcome. Yet, TWO cancer treatments later, she is pregnant with twin girls. Her ovaries were sectioned and frozen before the cancer treatment. She has had her own flesh implanted outside her pelvis. Eggs were gathered, IVF techniques used later with her male partner, and her uterus is now carrying two viable girls due to be born in about 3 months. Melbourne IVF's Associate Professor Kate Stern has explained the process today.

Comment Re:In Depth Fisking for the time crunched: (Score 1) 1255

I don't think a majority of college grads these days could pass the above-linked test.

Okay, I'll bite.

The arithmetic one is pretty terrible by modern standards. I have no idea what the "fundemental rules" are in their mind (+,-,*,/, perhaps?). Most of the rest require obscure knowledge of lolunits^Wsilly imperial units and quite possibly defunct details of a banking system.

As for the history, not being American, I couldn't answer many of them. The first one in particular ("epochs") seems to require one to recite a "fact" about something inherently subjective.

Orthography. 9 is important. People should be shot if they fail. 10 is quite funny though. And requires a rather odd piece of knowledge.

Georgaphy is not too bad. Quite a lot of denialists here would fail 1. 3 is funny. Rivers are useful for stopping invaders. Oceans are even more useful in the same regard.

Physiology is useful.

I don't know how many grads could pass the test. Some bits are good, some bits are bad, other bits are pointless.

Slashdot Top Deals

The Tao is like a glob pattern: used but never used up. It is like the extern void: filled with infinite possibilities.

Working...