Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Comment Re:Breakable encryption != no encryption (Score 1) 442

here's a more practical example:

I'm playing a game and the engine encrypts my traffic so I can't sniff the location of other player data in real time (radar problem).
The overhead of "age of universe" encryption would impact game performance *and* as long as the data is 5-10 min old before I can decrypt it, then my radar app is worthless...

So, a simple DH with 256bit keys renegotiated every 5-10 min is plenty of security for this application without impacting performance.

If, OTOH, I am doing banking and stock account management I want those login credentials and account codes to be secured for at least my lifetime.

Comment Re:I'm not sure it is (Score 1) 442

After all, the punishment for breaking a crypto law can't practically exceed the punishment they would get if they handed over proof of two decades of drug smuggling, contract murders, etc. Better to go to jail on that minor charge for a year or two than for the rest of your life.

DGATWOOD: you are hereby in contempt of court, you are to be held in jail until such time as you decide to produce the decryption keys for these flash drives found in your possession that are encrypted with an unapproved system.

In another vein, I see a market for custom flash drive firmware that reports a nominal capacity (like 8 gig) while actually being much larger (128 gig) and having the additional capacity (120 gig) locked away without a specific command being sent to the device.

Comment Re:I'm not sure it is (Score 1) 442

Different TLAs have different access levels.
I would fully expect the NSA/CIA to have access to break much higher encryption than the FBI, and to hide that fact from them.

Afterall, if you can break iPhone crypto, you *don't* want Apple or foreign agents to know this, and allowing the FBI to know means they'd use is it on (relatively) trivial targets and let the cat out of the bag.

Comment Re:Do *not* join the Cryptocurrency Mining Scene (Score 1) 261

Much like the '49 gold rush.
John Sutter did not make his money off the gold found at his mill, he made his money selling shovels and picks to the miners that showed up afterwards. The miners themselves barely broke even for the most part.

I have no interest in mining, but I do have an interest in a couple of shover manufacturers and am looking to start employment with a shovel seller.

Comment Re:"I want repaired processors for free" (Score 4, Informative) 366

it doesn't work that way at all.

Old designs would be for different process technologies. As the tech changes the DRCs (Design rule checks) change as well.

You can't run a design on a process it wasn't made for, the resulting product simply won't work correctly (if at all).

If the CPU was designed for a gate width of 35nM then it was designed with biasing around that gate width's leakage. If you then try to spin that part on a 14nM fab the biasing of the gates is all wrong and it will (likely catch fire) not work at all because of such high leakage.

Additionally, price doesn't scale the way you imply. A wafer start costs about $1K. Doesn't matter what process you run on it (it does, but not really all that much). The cost per part is based on the number of functional parts per wafer at the end. Thus going from an 8 to a 12 inch wafer lowers cost even though the process change requires a $2.2bn fab to be built, you have gone from 201 sq inches to 452 square inches, over *double* the yield.
Same thing from process shrinks, you cut the area used by your transistor gates and you make the die smaller, then you can fit more on a wafer.

Thing is, Intel may not even have fabs capable of making the older parts any more, even if they wanted to. Process tech has evolved, IDK if they even have an 8" fabs left...

To just "redesign" the part for the new process is not realistic either.

TLDR: To make an old part will cost the same or more than it did when it was the latest and greatest.

Comment Re:erase before entry (Score 1) 71

True, but this is about passing the cursory inspection without raising the kinds of flags that a fully deleted computer would raise.
As to the boot key, sure, but I was going for dead easiest:
key in boots secure
key out boots decoy
to clean up shop in a jiffy: boot decoy, insert and format key, move folder of pics over to key.

Comment Re:erase before entry (Score 1) 71

boot a plain jane windows partition with nothing of consequence on it for customs.
Plug in a USB key with a bootloader and boot a second partition that has been encrypted and has all your real files.

Customs isn't going to check disk manager and ask why you have all this "unpartitioned space" at the tail of a 20 gig or so boot volume.

USB key can be cleanly erased after last protected access is needed and prior to customs activity, just format and load with vacation pictures to overwrite previous data.

Perfect plausibility; highly unlikely to raise flags, etc.

In my case I have a travel phone that I use (nexus5) and I delete any apps upon heading through a border. I have unlimited data, so I can just re-download whatever app after the crossing.
Phone sees regular secure erasures as normal operation.

Slashdot Top Deals

My mother is a fish. - William Faulkner