Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment And it doesn't stop anything. (Score 2) 60

You can always make your own custom Secure Boot key database and sign whatever you want.

It's even easier on millions of Dell and Alienware computers that used the test key as their production Platform Key. You can just use the leaked private key to modify the keys without being easily detectable.

Comment FM coverage is spotty (Score 1) 85

Around here, the mountains make FM coverage spotty. AM never fails.

AM receivers are cheap and reliable. I think they should continue to me mandated in cars as a last-ditch mass communications method. If there were some licenses available around here I'd grab one and build a station. Alas....

Comment Re:are there alternatives that will actually work? (Score 1) 31

They really should use quantum-resistant algorithms alongside a traditional algorithm for now so that you have to crack both. Quantum algorithms are very new compared to our old favorites. One of the NIST finalists for quantum-resistant crypto was cracked using classical computing near the end of the standardization process, highlighting the danger of relying on these alone.

Comment I'll believe it when I see it (Score 3, Insightful) 83

Wake me when I can factor 1024-bit RSA keys. The Nintendo DSi and I have unfinished business.

I'm a pessimist, so I'm guessing--with no evidence--that we will find out that keeping N qubits coherent requires energy exponential in N, meaning that quantum computers are mostly useless.

Slashdot Top Deals

The trouble with computers is that they do what you tell them, not what you want. -- D. Cohen

Working...