Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment The System Is Hardened Against That (Score 1) 392

Smartphone encryption uses composite keys, made by combining the password the user punches in to gain access with a digital key baked into the phone. The latter is hard to extract by physical examination, and too strong to brute-force (256 bits, IIRC). Thus, an attack against an offloaded copy of the encrypted data is very difficult (effectively impossible if the attacker botches the attempt to extract the device key and burns it), and an attack against the user password alone can only be done on that device.

Comment You Missed The Stupidest Statement Of All (Score 1) 392

Apple and Google replied, in essence, that they could not [access the phones] — because they did not know the user’s passcode. (...United Way Update...) There is no evidence that it would address institutional data breaches

In words of one syllable (well, I can't do anything about the fact that "Apple" and "Google" are two syllables, so the authors of the article will just have to pop an aspirin and such it up): The whole point is to stop that kind of data leak -- if Apple and Google don't have it, a bad guy can't steal it from them.

Comment Re:It's the base assumption that its invalid (Score 2) 392

Safes can be accessed with a warrant only because it is beyond our ability to make an uncrackable safe.

That's not really a significant difference, since is is within our ability to make safes that are effectively impossible to crack without destroying the contents, which is equivalent from the point of view of government agents seeking information.

Comment Re:It's the base assumption that its invalid (Score 1) 392

Another approach would be breakable encryption with an auditable trail such that anyone who breaks an individual's encryption would have to defend such actions in court.

Voo-doo magic does not count as "another approach". (I am using the term in its precise technical sense. Unless the Feds' actions in breaking one copy of the file somehow produce observable effects upon the owner's copy of the same file (i.e. voo-doo magic), there is no way to "audit" their behind-the-scenes actions.)

Comment Re:Aftermath (Score 4, Informative) 546

You want a citation? Here's a citation:

In 2013, Reuters reported that documents released by Edward Snowden indicated that the NSA had paid RSA Security $10 million to make Dual_EC_DRBG the default in their encryption software, and raised further concerns that the algorithm might contain a backdoor for the NSA.

Comment Re:More important 3rd question ... (Score 1) 546

The blame for that lies with the NSA -- they intertwined their domestic and foreign operations like a pair of perverted Siamese twin octopi in order to get around the laws that (somewhat) limited their ability to perform domestic snooping (the NSA spies on the British subjects; GHCQ spies on the American citizens; the two trade files).

Comment Re:Blind sight. (Score 1) 108

They are just making this hubub to throw people off. They have key loggers and ways to view your screens that can not be detected with normal means. Using some other form of network that is hard to spot. Don your tin foil hats cause they can read brain waves too. Who really knows? With all the things I have read on USB and viruses being able to bridge air gaps; I don't know, it could very well be as advanced as I am making fun of. Mosquito sized drones and all.

That's true, and it shows that the ONOZ OMG TERRAISTS!!1! rhetoric is a pack of lies. You've listed (setting aside the facetious "tin foil hats" part) some techniques available to the government for monitoring legitimate targets of suspicion. However, it wants to snoop on everybody, and those techniques don't scale large enough to make that possible.

Comment Re:Back doors are weak for everyone (Score 2) 108

The point here is that the backdoor could be a second key instead of a way to break your key. Assuming that second key is also resistant to breaking then you haven't introduced any vulnerabilities to an outsider--assuming that the second key is kept secure. And that, it must be admitted, is a pretty damn big if.

That makes it an exercise in futility, easily defeated by hacking the system to substitute some other second key (which could be random gibberish, since it's not actually used, just put in to defeat the backdoor).

Comment I Thought The Supreme Court Ruled On This (Score 1) 183

Just last week they decided that "threatening" remarks on the Internet weren't no thing in the absence of clear evidence of intent to do more than blow off steam. Oh. Wait. That was a threat against some nobody, a precedent that clearly does not apply if the aggrieved party is instead a high and mighty judge. [_EMILY_LATELLA_] Never mind. [_/EMILY_LATELLA_]

Slashdot Top Deals

All power corrupts, but we need electricity.

Working...