Forgot your password?
typodupeerror
Encryption

60 Years of Cryptography, 1949-2009 104

Dan Jones writes "2009 marks 60 years since the advent of modern cryptography. It was back in October 1949 when mathematician Claude Shannon published a paper on Communication Theory of Secrecy Systems. According to his employer at the time, Bell Labs, the work transformed cryptography from an art to a science and is generally considered the foundation of modern cryptography. Since then significant developments in secure communications have continued, particularly with the advent of the Internet and Web. CIO has a pictorial representation of the past six decades of research and development in encryption technology. Highlights include the design of the first quantum cryptography protocol by Charles Bennett and Gilles Brassard in 1984, and the EFF's 'Deep Crack' DES code breaker of 1998."
Privacy

FBI Files a "Secret Justification" For Gag Order 167

An anonymous reader notes a story up at Ars on the FBI's continuing penchant for secrecy. "Clearly, the FBI isn't ready to give up its Bush-era secrecy addition just yet. ...in the case of Doe v. Holder, the FBI is carrying out a secret investigation using secret guidelines on what is and is not constitutional, and as part of that investigation they've compelled the secrecy of a service provider and are using a secret justification to argue that nobody's First Amendment rights are being violated."
Image

Stoned Wallabies Make Crop Circles 104

It's the tripnaut! writes "The BBC reports that Australian wallabies are eating opium poppies and creating crop circles as they hop around 'as high as a kite', a government official has said. 'The one interesting bit that I found recently in one of my briefs on the poppy industry was that we have a problem with wallabies entering poppy fields, getting as high as a kite and going around in circles,' says Lara Giddings, the attorney general for the island state of Tasmania. 'Then they crash,' she added."
The Almighty Buck

Copyfraud Is Stealing the Public Domain 263

malkavian writes "This community has complained long and loudly about the very one-sided approach to copyright, and the not-so-slow erosion of the public domain. On top of the corporate lobbying to remove increasingly larger parts of the public domain, there is now an growing pattern whereby works are directly taken from the public domain and effectively stolen by a single company leveraging protections provided under copyright law. The Register's article is based on a paper by Jason Mazzone at the Brooklyn Law School, which starkly details the problems that are now becoming evident as entities grab control over public domain works. The paper proposes some possible solutions, such as amending the Copyright Act. From the abstract: 'Copyright law itself creates strong incentives for copyfraud. The Copyright Act provides for no civil penalty for falsely claiming ownership of public domain materials. There is also no remedy under the Act for individuals who wrongly refrain from legal copying or who make payment for permission to copy something they are in fact entitled to use for free. While falsely claiming copyright is technically a criminal offense under the Act, prosecutions are extremely rare. These circumstances have produced fraud on an untold scale, with millions of works in the public domain deemed copyrighted, and countless dollars paid out every year in licensing fees to make copies that could be made for free.'"
The Courts

Pirate Bay Retrial Denied, Judge Declared Unbiased 331

bonch writes "A Swedish court has ruled that the judge in the PirateBay trial is unbiased and there will be no retrial. Stockholm District Court defended the judge's membership in copyright organizations as a necessity to 'keep up with developments in the field' and that merely endorsing the idea of copyright law was not grounds for a mistrial. The defendants must now rely on the appeal process, while one defendant has written on his Twitter account that the PirateBay will also be suing Sweden for human rights violations."
Encryption

IBM Claims Breakthrough In Analysis of Encrypted Data 199

An anonymous reader writes "An IBM researcher has solved a thorny mathematical problem that has confounded scientists since the invention of public-key encryption several decades ago. The breakthrough, called 'privacy homomorphism,' or 'fully homomorphic encryption,' makes possible the deep and unlimited analysis of encrypted information — data that has been intentionally scrambled — without sacrificing confidentiality." Reader ElasticVapor writes that the solution IBM claims "might better enable a cloud computing vendor to perform computations on clients' data at their request, such as analyzing sales patterns, without exposing the original data. Other potential applications include enabling filters to identify spam, even in encrypted email, or protecting information contained in electronic medical records."

Slashdot Top Deals

Mausoleum: The final and funniest folly of the rich. -- Ambrose Bierce

Working...