Forgot your password?
typodupeerror

Comment ROT13... (Score 1) 246

...anyone?

Just how easy to crack do these monkeys want it to be so that it won't hamper their investigations?

But it might help the marketplace find room for more open-source devices that can be more easily (less technically) loaded with secure open-source OSs than we have today.
Encryption

Deprecation of MD5 and SHA1 -- Just in Time? (threatpost.com) 87

mitcheli writes: If you're hanging on to the theory that collision attacks against SHA-1 and MD5 aren't yet practical, two researchers from INRIA, the French Institute for Research in Computer Science and Automation, have provided reason for urgency. They demonstrated a new series of transcript collision attacks centered on the SHA-1 and MD5 implementations in TLS 1.1, 1.2 and 1.3, along with IKEv1 and v2, and SSH 2. They say, "Our main conclusion is that the continued use of MD5 and SHA1 in mainstream cryptographic protocols significantly reduces their security and, in some cases, leads to practical attacks on key protocol mechanisms (PDF)." Of course, Mozilla officially began rejecting new SHA-1 certificates as of the first of the year. And as promised, there have been some usability issues. Mozilla said on Wednesday that various security scanners and antivirus products are keeping some users from reaching HTTPS websites.

Comment We live in an age where... (Score 1) 956

From the article: “We live in an age where you can’t take things like that to school,” he said. “Of course we’ve seen across our country horrific things happen, so we have to err on the side of caution.” said Chief Larry Boyd

I have trouble with the chief's justifications for stating that a kid "can't" take an electronics project to school? Can't?

Ignorance isn't a good enough excuse for mistaking an electronics project for a bomb. That's all on the school board and the police.

Idiots.
Encryption

Prosecutors Op-Ed: Phone Encryption Blocks Justice 392

New submitter DaDaDaaaaa writes: The New York Times features a joint op-ed piece by prosecutors from Manhattan, Paris, London and Spain, in which they decry the default use by Apple and Google of full disk encryption in their latest smartphone OSes (iOS 8 and Android Lollipop, respectively). They talk about the murder scene of a father of six, where an iPhone 6 and a Samsung Galaxy S6 Edge were found.

"An Illinois state judge issued a warrant ordering Apple and Google to unlock the phones and share with authorities any data therein that could potentially solve the murder. Apple and Google replied, in essence, that they could not — because they did not know the user's passcode. The homicide remains unsolved. The killer remains at large."

They make a case for lawmakers to force Apple and Google to include backdoors into their smartphone operating systems. One has to wonder about the legitimate uses of full disk encryption, which can protect good people from harm, and them from having their privacy needlessly intruded upon.

Comment Re:Plagiarism and Attribution (Score 1) 166

<quote>But the standards for scientific papers are higher than the standards for poetry. Poetry stands on its own...</quote>

What if science is my poetry? What if I recall its exact form as easily as I recall a poem but like Hognoxious above I can't remember if it's something I've created or something I gained from elsewhere?
Science

Submission + - Proteins build 'cages' around bacteria (nature.com)

ananyo writes: Research in human cells shows that proteins called 'septins' are able to build cages around pathogens to prevent them infecting other cells. According tot he researchers, the newly discovered defence system could lead to new therapies for diseases. The microbes trapped in the cage are later broken down by the cell.

Slashdot Top Deals

The best book on programming for the layman is "Alice in Wonderland"; but that's because it's the best book on anything for the layman.

Working...