Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment What is a good email provider (Score 1) 115

This raises the question about email providers. Who provides good, private, secure email service? If Hushmail has handed over keys & data on request, I'd rather not pay them €50-100 per year. In truth I'm not an international criminal or James Bond or anything... so I can't really justify too much cost. But surely there is a service which does not retain data for too long and would at least ask for a court order before handing anything over... and does not assume you have the financial backing of a TLA.

Comment Re:I've said it before, and I'll say it again.. (Score 2, Insightful) 490

Encryption can only be useful for emails when people use it for all or most of communications, so that one does not instantaneously flag communications of interest. Looking at my email habits, there are: 4 people who work for firms where encryption is specifically forbidden in company policy. 12 people who absolutely could not be taught how to use encryption... Including my mother who writes email as if she sending a telegraph and is paying per character. 2 people who could use encryption but who don't use it either, for the same reason I don't, the pool of potential recipients is too small.

Comment "A highly respected journal" (Score 4, Insightful) 286

As a subscriber to Nature I find it interesting that when we're talking about amino acids Nature is a highly respected international weekly journal of science but.... when we're talking climate science it's the nexus of an evil, duplicitous, Socialist, Marxist, environmentalist cabal bent on destroying the fabric of American society.

Comment Re:A big book (Score 4, Insightful) 78

The key phrases you are looking for are "rainbow tables"; "time / memory trade-off"; "distributed computing"; "embarrassingly parallel"; "GPGPU Computing" and probably "More's Law".

So now computers are faster than when they cooked that "100,000 years" phrase. They are employing many different computers with multiple cores. GPUs are much faster at this calculation that X86 processors. Rainbow tables are ingenious methods to store precomputed results, so the actual cracking is simple comparisons between encrypted text with known values and the data you are attacking.

Slashdot Top Deals

If you think the system is working, ask someone who's waiting for a prompt.

Working...