Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

Comment Re:A question for people familiar with cryptology (Score 2) 38

Unlock all interactions? No. Unlocking a specific interaction? Maybe.

For common uses (like the public web), the most likely approach to decrypting a specific interaction is to break the RSA (cert-based) on the outside and then the Diffie-Hellman (ephemeral per-transaction) on the inside, then recover the symmetric encryption key to decrypt the rest of the conversation. But this is not trivial, and it requires more work than to just toss the transaction into the quantum computer.

The ephemeral layer is where things get harder. Even if you can derive the RSA key on a regular connection, you've got the first layer, but the DH layer is redone for each new connection. (Some sites don't use DH, or are vulnerable to downgrade attacks where DH isn't used, but DH is pretty widespread.) Every ephemeral negotiation has to be individually cracked. Tor uses DH or x25519 on all connections, so each has to be individually cracked. It is expected that breaking an individual 2048-bit RSA or DH encryption would take several hours if one had a quantum computer of sufficient power. Cracking 3072- or 4096-bit RSA/DH will take even longer, if it's even possible on the same systems. However, we appear to be a long way from such capabilities, and the NSA isn't likely to use it to break arbitrary Tor connection encryption, saving it instead for much more practical items. As soon as the NSA has practical quantum computing, it's going to have decades of backlog to go through just for the international signals, and getting anything moved up in line is going to need a damned good reason.

Comment Re:So estheticians had a problem (Score 1) 56

Almost all US healthcare spending is by the government. And the US government spends more per person on health care than any other country spends government+private. By a lot.

https://www.statista.com/stati...

A large majority of that government spending is direct spending on Medicare and Medicaid, not subsidies for insurance. So when you complain that the US "doesn't even have a functioning healthcare system", the most obvious reason is because our governments have broken the system.

Comment Re:Targeting the people who have aged out of it (Score 2) 11

Isn't that why they make phones with 256+ GB storage? "The cloud" (aka "someone else's computer") might be convenient in various ways, but it's inherently slower than what is already on your phone, and it doesn't work so well from the top of a mountain[1], the bottom of a parking garage, or other places with lousy mobile coverage.

[1]- I was surprised that Mount Fuji had mobile good coverage all the way up, but I guess Japanese people also want to Snapchat/SNS from there.

Comment Re: If an attacker has physical access to my DIMM (Score 1) 96

... if you trust pseudonymous Internet randos over the US intelligence community and DoD, at least.

https://www.nextgov.com/modern...
https://www.cnbc.com/2022/12/0...

These clouds have multiple layers of security, several of which reduce the likelihood that someone will install an interposer in a server undetected. (Or, in the case of the Wiretap photo, job up a logic analyzer to a compromised server.) Cloud vendors are also likely to have moved quicker to DDR5, which isn't vulnerable to either of these attacks.

Comment Re: If an attacker has physical access to my DIMMS (Score 1) 96

That's a dumb take. The US has been writing cloud computing contracts for TOP SECRET content for years, to say nothing of public web sites. Australia and New Zealand have specific infosec guidance (their Information Security Manuals) that not only recommend particular controls when using cloud vendors, but that encourage use of cloud vendors, CDNs, and similar services to improve availability of government-provided information and services.

Everyone should have contingency plans and fallback capabilities, but there are lots of places that cloud services make sense.

Slashdot Top Deals

8 Catfish = 1 Octo-puss

Working...