Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Screams "action movie" (Score 2, Interesting) 226

It might be better to keep the GPS on in situations of 'extreme' distress. Let's assume you are so sick you can't even talk. Then when you call 911 the phone might recognize you are not talking and synthetise a message saying for example 'The owner of this phone appears to be in extreme distress and at this moment the GPS says that he is at X address. Please send an ambulance at the address'.

You could apply the same concept to action movies too. Like Jack Bauer being trapped and unable to talk that calls CIA head quarters :)

Comment Indistinguishability (Score 1) 374

Actually crypto systems are evaluated by a concept called indistinguishability. The key idea, is that an attacker cannot distinguish the output of a cipher algorithm from a uniform and random distribution.

For example if you use AES in CBC mode, there is no way of distinguishing its output in polynomial time from one truly random. It's specified in polynomial time because, for example AES in CBC will cycle after 2^128 blocks generated.

My guess is that there must be an implementation or a design error in TrueCrypt that should be fixable.
Or maybe this company is full of BS..

Comment I don't agree (Score 1, Interesting) 413

Of course it depends on Microsoft's implementation of the whole thing. But if done correctly Windows XP will run in a nice environment that is protected by Windows 7.
In fact, Windows 7 could act as an Hypervisor to secure XP.

A hypervisor is great when it comes to security, because from its vantage point it can control the guest OS (antivirus, firewall, etc.) without risking to be compromised itself.

Comment Re:Why trust the PKI? (Score 1) 300

Oh yeah, also your Electric Company should give you one, your phone company and Paypal should send you one and EBay, Amazon.. Wait a minute. This would be a mess of CDs and usb keys. You know what, let's set up a single place accessible on line where all this certificates are stored.. Let's call it, Certification Authority :)

Comment embed encrypted contents in other formats (Score 1) 940

here is my idea about how to overcome the problem. When your hard drive is encrypted, with True Crypt for example, this is immediately visible to any observer. So they can take your laptop away or ask you to give out the password. Instead I would like to code a little utility, to pass the frontier :) The main thing to notice is that encrypted data is, high entropy data with no meaning (if you don't know the algorythm and the key :). So the idea would be to embed encrypted data in other formats that have high entropy as well, like compressed files or videos. If they try to open the video or the compressed file they will get meaningless and apparently corrupted data. So what? Haven't you ever had a corrupted video or compressed archive on your hard disk? Obfuscate encrypted data as corrupted compressed data of some sort should fool them. What do you think?

Slashdot Top Deals

2.4 statute miles of surgical tubing at Yale U. = 1 I.V.League

Working...