Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Re:Did they give him an anal probe? (Score 3, Informative) 328

The NYT article linked from TFA clearly states that the tournament was broadcast live on the internet, and this fellow lost due to a rudimentary mistake in the last round when the organizers switched off the live broadcast, which lends some credence to the OP's suggestion. As another poster stated, a 1 or 2 move delay in the live broadcast would mitigate this issue.

Comment Re:Can this possibly be secure? (Score 1) 391

Assuming it's based on what they purchased from LaLa, it's fairly trivial to get them to give you a good copy of an arbitrary track. I tried this when LaLa debuted their "cloud music service", which would scan your library, matching tracks by, as far as I could tell, tags only. I took a random MP3 file, re-tagged it to a track that I didn't own, and ran the Lala scanner. Sure enough, it showed up on Lala as a track that I owned and could listen to an unlimited number of times online. Of course at that point Lala didn't let you re-download matched tracks as Apple will, so it was limited. But I'm forced to assume that if you have the patience, you could get Apple to give you 256Kbps MP3s of albums you don't actually own.
Encryption

Submission + - OpenSSL Timing Attack Steals Private Keys (threatpost.com)

Trailrunner7 writes: Remote timing attacks have been a problem for cryptosystems for more than 20 years. A new paper shows that such attacks are still practical and can be used to steal the private key of a TLS server running OpenSSL. The researchers, Billy Bob Brumley and Nicola Tuveri of Aalto University School of Science, focused their efforts on OpenSSL's implementation of the elliptic curve digital signature algorithm (ECDSA), and they were able to develop an attack that allowed them to steal the private key of an OpenSSL server.
In an interview, Brumley says that the attack is just a symptom of other problems. "Perhaps the scariest part is that the piece of code introducing the vulnerability has been in the library since roughly 2005. This shows that identifying timing attack vulnerabilities is a daunting task. This isn't the first timing attack vulnerability discovered in OpenSSL, and I can guarantee it won't be the last."

Slashdot Top Deals

Nothing ever becomes real till it is experienced -- even a proverb is no proverb to you till your life has illustrated it. -- John Keats

Working...