Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Re:Does Iran have any home-grown IP infrastructure (Score 1) 61

I was assuming that they were mandating that these so-ordered officials stop using digital communications
The article states a limited ban on connected devices. Officials and their security teams are forbidden from using devices such as Laptops and phones which connect to public networks.

Thus suggesting that there are also private networks, and they may still use some devices which do not connect to public networks.

Comment Re:I'm Still Not Seeing It (Score -1) 18

I don't own a computer. I am not a programmer. I do everything from my iPhone.

In the past 10 years, I have spent tens of thousands of dollars on human programmers to create 3 web apps. Zero of them ever were finished. ZERO.

I used Grok AI to create 5 web apps. 3 of them were monetized almost immediately and have paying clients. All 5 have passed security checks that look for bugs or hack entry points.

One of the 3 monetized web apps took me all of 30 minutes using Grok, on an airplane, using my iPhone. I was able to download the files and upload them to a web server and the site was live. Literally 30 minutes and that website has created thousands of dollars of passive income.

I use vibe coding DAILY to make spreadsheets better for me and clients (I am not in IT). I use vibe coding DAILY to come up with cool functions for my web apps that people pay me to use.

Comment Re:Slack off in mission-critical ... (Score 1) 36

Kind of hilarious that they passive-aggressively blame "business requirements" for the problem:

" Regardless of the business need for near instantaneous consistency of the data globally (i.e. quota management settings are global), data replication needs to be propagated incrementally"

Comment Re: was this (Score 1) 36

This is pretty good for an external report.

No it's not lol.

The problem here is that the code path with the bug was cut it abruptly rather than gradually;

Your sentence doesn't make sense, it's not grammatical. Furthermore the problem was not abrupt: the code was merged in May, the outage was in June.

The report is bad.

Comment Re:Back to basics? (Score 1) 61

My guess is at some point there will be a secure public communications network, the internet isn't it.

You just go to a telecom provider and order either Point-to-Point circuits or Dark fiber to be installed between your buildings and a centralized building of yours with the extra stipulation that your point to point links have to traverse dedicated fiber exclusively.

Then when you go to connect up the fiber ports you configure and provision either 802.1AE MacSec or QSFP-DD transceivers with Layer 1 encryption support (Where you can set a static AES-256 key for each transceiver pair), Or use BOTH MacSec and Layer 1 encryption - resulting in double layer encryption.

You can also use a parallel fiber links for low-bandwidth Quantum Key Distribution - Quantum encryption providing a mechanism that could be securely used to distribute rolling keys for the primary link.

In any case; All the tech has been created to allow a high-bandwidth private communications physical layer network.
The only problem is.. What the heck are you going to even bother using that network for without internet access?

Comment Re:Does Iran have any home-grown IP infrastructure (Score 1) 61

Traffic analysis might be enough to expose the structure of covert organizations.

What if 20% of the members of the organization have a daily task to make sure they create and send a total of at least 10 to 20 encrypted messages each at random times of day? The actual 20% of org members who have this task would rotate daily, And most members of the org have no knowledge or assignment other than to create and send the messages.

A random number between 0 and 50% of the total messages are sent to actual other members of the organization which can be anyone, so the structure of the org is hidden.

The rest of the messages are sent to strangers' valid phone numbers learned from other sources. In other words; the organization has a daily task of members sending encrypted messages to outsiders who cannot even decrypt the message. Since the phone numbers are random; an adversary looking in cannot tell whether the message is readable by the recipient, or if the message is Spam as far as the recipient is concerned.

The message has to be decrypted by an initial layer first before the recipient can tell whether it even claims to be a legitimate message.

When a member of the organization receives such a message they are to flip a coin and pick between ignoring the message or giving a canned reply based on their own study of how people react to receiving a message from a stranger they don't understand.

Comment Re:Does Iran have any home-grown IP infrastructure (Score 1) 61

there's a reasonably good chance that there will be attempts by one's adversary to use that technology against one in some capacity.
Yes, there is. But this also makes fixating on the internet connection perhaps unreasonable.
So as you're probably aware, there notoriously exist these devices called Stingrays.

Cell phones that don't use Internet are still just as good at exposing your location over the corresponding protocols.

At this point you're going to stand out If all the cellphones in an area with purposefully no internet connectivity can be identified and located precisely. But your officials' cellphones are the only phones oddly configured that way. Or they use a specific make and model device which is not used by the rest of the population, but still connect to the cell network.

Slashdot Top Deals

You're already carrying the sphere!

Working...