Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Your Crazy (Score 1) 417

Even if the police know for a damn fact there's illegal materials in the encrypted volume, requiring him to unlock the volume is tantamount to requiring him to acknowledge ownership of the volume, which is self-incrimination.

"Is this your drive?"
"Fif."
"Unlock the drive."
"Okyday, here's the password."
"How would you know the password if it wasn't your drive?"
"Fif."
"Too late."

Comment Re:Its the mind not the body ... (Score 1) 115

I never saw that. I saw the CDF SF troops portrayed as children, sure, but other than occasional references to previous careers, the old troops weren't portrayed as having bountiful wisdom or experience. Quite the opposite, in fact. Take, for example, the CDF rook who was a senator in real life, who hadn't learned shit.

Comment Re:Impossible? (Score 1) 192

You could accomplish the same thing by having Alice's pad contain half of the full OTP, only the odd numbers, and Eve having only the even numbers.

Even better, use a third person with a third OTP to determine if the next sequence goes to Alice or Eve (i.e. Bob's pad is a string of numbers; if the number is odd, the next digit comes from Alice's pad, if even, Eve's pad.)

Comment Re:Got it backwards (Score 1) 192

The pads are randomly generated, not random. Each pad needs to be longer than your message. No part of the pad is ever reused; if you have the first half of a pad, you can decrypt anything encrypted with that half, but it tells you absolutely nothing about the second half of the pad, because it's all random, not an algorithm. If you have the cleartext, you could not reverse-engineer the pad from it, and even if you could, you couldn't use that to determine the rest of the pad.

Here's how it works.

You generate a random pad. In the old days, when the term originated, it was literally a pad of paper with random letters.

The sender and receiver must have identical copies of each pad. For example, lets say you generate a pad for each day of a year, and distribute a copy to each embassy. So each pad has a master number, 1 through 365, and each embassy has it's own in that series.

Each and every one of those copies must be physically secure. If they are, the communications are unbreakable. If they are not, the communications are not.

In the above example, each day's pad might be on, in this day and age, a secure USB key, shink wrapped, with anti-tamper foil. If, in daily inspection, any key is missing, appears to have been altered in any way, the shrink wrap scratched or warped, whatever, every embassy is immediately directed to burn their copy of that pad. Once the pad is used, or at the end of the day, each copy is burned to prevent accidental reuse.

It's part of a cryptographic system, not a complete methodology in and of itself. And it's no different than the idea that, say, public/private key encryption is secure until you misplace your private key.

Comment Re:Quicktime HD video playback is worse. (Score 1) 519

I've seen the same. I've even had iTunes 11 with current quicktime flat-out refuse to play a video as my 'computer is too slow, but WMP, VLC, ANY other program will play it without a hitch.

For reference, Apple claims an i7-3770 quad-core 3.4 ghz machine with GTX660 SLI and 32 gigs of ram can't play a file that an iPad will play fine.

Comment Re:What learning curve? (Score 1) 536

I've said it before, and I'll say it again; the metro screen is a full-screen start menu with vista/7 gadgets built in and expanded.

But this is a prime example of why Microsoft is still around after 20+ years, when so many other computing companies aren't; they're surprisingly agile for a large company. They'll try something, and if it doesn't work, they'll move on.

They demonstrated this back on the 95 era, when in the space of six months, they went from 'internet, schminternet' to 'internet! internet! internet!' and they're demonstrating it again.

Slashdot Top Deals

To the systems programmer, users and applications serve only to provide a test load.

Working...