Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment Review the code all you like.... (Score 1) 130

...Interdiction is where it's at: https://www.techdirt.com/artic...

Or maybe use IPSec / SSH with DH Group 19 - that's not looking too clever either: https://weakdh.org/imperfect-f...

All in all, if your threat model includes the NSA then reviewing 30m LOC may seem like a good place to start but in practice.....

Comment Not sure how they get greater mass surveillance... (Score 2) 264

The Snowden revelations show that the UK snoop on its own citizens without any barrier. The RIP Act can be used to compel handing over of pass phrases with threat of 2 year prison sentence for failure to comply. Short of legislating against the use of crypto or allowing 'in camera' use of surveillance material its hard to imagine a what other powers the state are after.

Comment For people impacted by this issues (Score 3, Informative) 359

Comment Re:Score: -1, Flamebait (Score 5, Informative) 359

Mainstreaming reporting started in the last few days. The issue has been reported consistently for nearly a year. I and many other impact users have reported faults in stores, reported via Apple Product Feedback in forums and written to Tim Cook to complain. Not only do they ignore the issues reported on the forum but they also delete posts with links to online forums, news stories and petitions. Nice work Apple.....

Apple do little on the issue and offer you a (paid for) repair service to fix this systemic fault. The repair being a replacement board that many users report fails again anyway.

Comment Schneiers most recent comment.... (Score 4, Informative) 236

Bruce Schneier http://www.wired.com/opinion/2013/09/black-budget-what-exactly-are-the-nsas-cryptanalytic-capabilities/ stated that "Breakthroughs in factoring have occurred regularly over the past several decades, allowing us to break ever-larger public keys. Much of the public-key cryptography we use today involves elliptic curves, something that is even more ripe for mathematical breakthroughs. It is not unreasonable to assume that the NSA has some techniques in this area that we in the academic world do not. Certainly the fact that the NSA is pushing elliptic-curve cryptography is some indication that it can break them more easily."

I'd not rush from DH to ECC but would strongly recommend a move to 2048-bit or above keys

And have just realised that I haven't posted to Slashdot for many years...And yet somehow my .sig is still relevant. NSA may have dropped their plans for mandatory Escrow 15 years ago after the quote was made...but they didn't change the fundamental goal: to read everything.

Slashdot Top Deals

There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence. -- Jeremy S. Anderson

Working...