Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

New Software Secures Data when Owners Walk Away

chrisd posted more than 11 years ago | from the don't-lost-your-watch dept.

Security 304

Makarand writes "Leave an operating laptop unattended on your desk and your sensitive data is accessible to anyone who gets hold of it. To limit this risk many users configure their systems to fall into a "sleep" mode after a period of inactivity and ask for a password before the system can be awakened. This constant re-authentication proves to be a headache for many users. Now a Professor and his graduate student at at the University of Michigan have come up with a system called Zero-Interaction Authentication (ZIA), described in this article in The Age, to protect data on mobile devices. The system works by starting to encrypt data the moment the owner walks away from the system. The owners wear a token with a encrypted wireless link with the laptop. If the token moves out of range the ZIA re-encrypts all data within 5 seconds. If the cryptographic token moves within range the system decrypts the information for the owner. The token, which could take many forms, is currently a wristwatch with a processor running Linux designed by IBM."

cancel ×

304 comments

Sorry! There are no comments related to the filter you selected.

Most Beloved Slashdot Members (-1, Flamebait)

Anonymous Coward | more than 11 years ago | (#4920397)

Rank | Real name | Occupation | /. nickname | # fans
1) Rob Malda [cmdrtaco.net] - Slashdot founder - "CmdrTaco [slashdot.org] " - 975
2) Wil Wheaton [wilwheaton.net] - Actor/Activist - "CleverNickName [slashdot.org] " - 784
3) John Carmack [webdog.org] - Programmer, id Software - "John Carmack [slashdot.org] " - 606
4) Eric Krout [erickrout.com] - Bucknell engineering major - "ekrout [slashdot.org] " - 522
5) Bruce Perens [perens.com] - Writer - "Bruce Perens [slashdot.org] " - 516
6) Josh Marotti [marotti.com] - J2EE consultant - "FortKnox [slashdot.org] " - 381
7) Jeff Bates [hemos.net] - Slashdot co-founder - "hemos [slashdot.org] " - 318


Please notify me of any corrections. Updates: Added Wil Wheaton per AC comment; Added Bruce Perens; Added John Carmack; Moved Eric Krout up one spot to #4 after overtaking Bruce Perens

As it stands, I'm more than halfway there toward gaining more fans than Rob "CmdrTaco" Malda. That would be a neat accomplishment and one that I'd be very proud of.

If I can come through (I was on sabatical for a week), I think it would only be proper for Rob to give me some leadership position here at Slashdot. Perhaps I could serve as a liaison between the members and the editors/coders to ensure that Slashdot continues to develop and "scale" with its increasing membership and database size.

Thanks for reading. I truly love you all and enjoy the time I spend here at Slashdot. If I can help any of you with anything (even non-Slashdot related), please let me know. I'm always there for friends (and fans ;-D).

Re:Most Beloved Slashdot Members (-1, Offtopic)

Anonymous Coward | more than 11 years ago | (#4920599)

hey, where's the list of the most hated slashdot members? my first guess is Klerck.... [slashdot.org]

Does anyone even come close to him?

The token communicates (0, Troll)

Anonymous Coward | more than 11 years ago | (#4920398)

with the laptop via wireless 802.11b technology featuring the uncrackable WEP technology.

repeat article (5, Informative)

Jucius Maximus (229128) | more than 11 years ago | (#4920546)

The repeat mania continues ... amazing.

The original is here [slashdot.org] . At least they waited some weeks before reposting it.

FP (-1, Offtopic)

Anonymous Coward | more than 11 years ago | (#4920404)

Fp on a dup story with a 2 min waiting time

YOU FAIL IT! (-1)

Failure Guy (627040) | more than 11 years ago | (#4920505)

First poster? You are more like a FAILURE POSTER! [posternow.com]

YOU FAIL IT!

Finally... (0)

Anonymous Coward | more than 11 years ago | (#4920408)

The 21st-century catches up with laziness at last.

wouldn't it make more sense (4, Interesting)

drDugan (219551) | more than 11 years ago | (#4920409)

would it not be more sensible to make the token a passive device, like one with an RFID

I'm not an expert in encryption, but I have had serveral security related dongles and all of them were a pain in the arse.

it would seem that there are technologies (I've read about) that can return specific information passively when hit with specific radio frequencies. Wouldn't these be more easily used than a powered device like a watch?

Anyone else know more about these technologies?

Re:wouldn't it make more sense (3, Informative)

DoctorPhish (626559) | more than 11 years ago | (#4920467)

I think the problem with rfids in a security environment is that anyone with a reader could query the device as you walked by, and would have your encryption keys (or token id, or whatever), and could probably reproduce them without too much grief...rf tags can't perform authentication, as far as I'm aware..

Re:wouldn't it make more sense (2, Interesting)

drDugan (219551) | more than 11 years ago | (#4920498)



I think that my thought was that the
(hypothetical) passive device return a different
signal dependant on the signal recieved, not
simply the same one each time. ...

The more I think about it, the more it sounds
like such an action would require an
"active" (ie powered) device to accomplish
this.

but since I don't understand how RFIDs work
at all, the question still stands... could
it work with a passive (non-powered) device?

Re:wouldn't it make more sense (3, Insightful)

DoctorPhish (626559) | more than 11 years ago | (#4920590)

Well, I'm only an armchair cryptanalyst, but to the best of my knowledge you need some kind of challenge-response system in order to ensure that everyone is who they say they are. That pretty much eliminates any passive system, unless there are some wacky theoretical mathematics I don't understand...

Re:wouldn't it make more sense (1)

skwm (581559) | more than 11 years ago | (#4920566)

That would work, but the laptop would need to power the RFID reader. Looking at the specs for a random RFID reader, it needs a constant source of 12VDC, drawing 200mA of power. I'm not sure of the capacity of laptop batteries, but I assume that this would drain them quickly.

Re:wouldn't it make more sense (0)

Anonymous Coward | more than 11 years ago | (#4920619)

200mA @ 12VDC is 2.4 Watts (simple P=IV). My dell laptop battery (the standard one that it comes with) has a 65120mWh capacity (65.12Watt-hours). So it could power this RFID reader for 27 hours. Considering that most laptop batteries only power the computer for 3-4 hours MAX, the power drain from the RFID is insignificant in comparison.

Re:wouldn't it make more sense (4, Informative)

LostCluster (625375) | more than 11 years ago | (#4920560)

RFIDs are "dumb" devices. They're like your EZ-Pass in your car, when a radio beam passes through them, they alter the beam to add their "signature" which is uniquely identifyable. This is useful for identity, but nonsense for encryption. The problem is that if you are within range to "hear" the signal, you get the ID and enough to make a duplicate token. Tardly the model for security. There's no place for encryption here... whatever value is broadcast is the key value. By requring the token to have a microprocessor, the key never gets broadcast. It's an encrypted conversation between the station and the token, which if properly implemented makes it impossible to have a duplicate token take its place.

Re:wouldn't it make more sense (3, Insightful)

swordboy (472941) | more than 11 years ago | (#4920592)

I'm not an expert in encryption, but I have had serveral security related dongles and all of them were a pain in the arse.

Which is why most users would just leave the dongle next to the PC with the sticky note that has all of their passwords on it.

User's need to be in the habit of locking the workstation when they leave it. A good IT department will audit this (at least for the users that reside in the office... that goes for plain-view passwords, etc) and penalize users who do not (give them a slow POS or something with a ton of dead pixels). Soon, it will be a subconscious task that is performed before the PC is left. Add a hard drive password (laptop only?) or a drive encryption mechanism (like Safeguard [utimaco.com] and the data is more secure than it would be with a dongle.

In Sovjet Russia (0, Funny)

Anonymous Coward | more than 11 years ago | (#4920410)

Software walks away after owner has been secured!

Yes, but (1)

SigNuZX728 (635311) | more than 11 years ago | (#4920411)

This sounds like a really great idea. What program does the encryption, how fast is it, and what all does it encrypt? Just documents, or the whole system?

Re:Yes, but (1)

DoctorPhish (626559) | more than 11 years ago | (#4920484)

Whole-drive encryption has been around for a long time now...even in-software encryption isn't bad on modern systems. I think the technology that makes this interesting is the token system used to determine the presence of a certain individual, and only decrypt the contents in this case. The underlying encryption technology would be inconsequential (provided it was strong enough for your needs)

Re:Yes, but (1)

Zeal17 (602971) | more than 11 years ago | (#4920497)

The article mentions that it encripts the disk cache.

-Zeal

It'll be a movie plot element within 3 years. (2)

Apuleius (6901) | more than 11 years ago | (#4920412)

Specifically, someone with such a token getting clubbed on the head and stuffed in the office supplies closet, and his token stolen.

Sounds like a good idea, but.... (1)

f00zbll (526151) | more than 11 years ago | (#4920415)

what if someone steals the device? The system could add a password, but if someone steals the watch and the laptop makes no difference. Sounds like it just saves lazy people from typing in their login.

Re:Sounds like a good idea, but.... (1)

countzer0interrupt (628930) | more than 11 years ago | (#4920485)

what if someone steals the device?


The headline in the article reads "The snoop-proof laptop" - the aim is to prevent people snooping, i.e. covert data theft. If the device is stolen then you know your data is at risk, or has already been stolen. Basically, you want to be the first to know if someone's just read all your secrets.

Re:Sounds like a good idea, but.... (1)

Zeal17 (602971) | more than 11 years ago | (#4920514)

The article also mentions that a password would be needed in the token. So, if the token is a watch, I would assume that if you took it off, a new password entry would be needed.

-Zeal

repost (0)

Anonymous Coward | more than 11 years ago | (#4920416)

this was posted nearly a year ago. interesting, but old news.

Interesting article/research project (5, Insightful)

ekrout (139379) | more than 11 years ago | (#4920417)

But what happens when the neighborhood/college/company bully steals your watch?

Re:Interesting article/research project (5, Funny)

EverDense (575518) | more than 11 years ago | (#4920463)

Then you offer praise to whomever you worship that the company you work for didn't use
finger print authentication. Its a lot easier to replace a stolen device than a stolen finger.

Re:Interesting article/research project (1)

McCrapDeluxe (626840) | more than 11 years ago | (#4920477)

At the beginning of the process, the user enters a password on the watch. "That's to make sure an imposter isn't wearing your token," Noble says. They would need your password, too.

Re:Interesting article/research project (1)

Anonymous Coward | more than 11 years ago | (#4920478)

Typical nerds comment. When a "bully" attacks me, I fight back! They usually run away with a few teeth missing. You sissies deserve to get your ass kicked and watch stolen.

Re:Interesting article/research project (2, Funny)

spruce (454842) | more than 11 years ago | (#4920543)

So in your scenario, the big bad neighborhood bully beats the nerd to a pulp, and then logs on for some kernel hacking or something?

Re:Interesting article/research project (2)

LostCluster (625375) | more than 11 years ago | (#4920572)

Same thing that happens when you lose your physical key or your pass-card... you change the lock so that the old watch is no longer acceptable, and you get a new watch who is the new keeper of the key.

Much like my ex-wife (-1, Flamebait)

Anonymous Coward | more than 11 years ago | (#4920418)

as soon as I walk away her legs spread open for others.

Great! (0)

Anonymous Coward | more than 11 years ago | (#4920421)

Now all I need to do to access some sensitive information is to beat up some pasty-faced grad students!

Sounds like smartcards (3, Insightful)

Cat_Byte (621676) | more than 11 years ago | (#4920424)

Sounds like the smartcards to me where you stick it in the slot & it knows your password, domain, etc. Console is locked unless you have the card.

Re:Sounds like smartcards (2, Insightful)

Cat_Byte (621676) | more than 11 years ago | (#4920466)

This is not a troll. It's exactly the same thing a smartcard does.

Re:Sounds like smartcards (2, Insightful)

Cat_Byte (621676) | more than 11 years ago | (#4920489)

How the hell is saying this technology is a ripoff from smartcards a troll? Are you mods still on crack? I use smartcards and they're more configurable than these from what I read about them.

in Soviet Russia (-1, Redundant)

Anonymous Coward | more than 11 years ago | (#4920426)

In Soviet Russia, software encrypts YOU!

IN NAZI GERMANY... (-1, Offtopic)

Anonymous Coward | more than 11 years ago | (#4920502)

you could be arrested for encrypting something!

Would that be the J R R Token (4, Funny)

cyber_rigger (527103) | more than 11 years ago | (#4920428)

That you wear on your finger? :^)

Re:Would that be the J R R Token (1)

binner1 (516856) | more than 11 years ago | (#4920501)

Given the day, I'd mod that "+1 Funny (Points for Effort)" !

-Ben

Re:Would that be the J R R Token (1, Insightful)

Anonymous Coward | more than 11 years ago | (#4920520)

Actually, there is a technology that uses an encoded ring to let you fire a gun. The gun senses the ring and unlocks itself.

Something like that would make more sense than having a tiny computer running in your huge-ass watch. I don't even wear a watch or ring (even when I was married) because I hate the feel. I would rather wear a ring than a giant watch though.

In soviet... (-1, Troll)

Anonymous Coward | more than 11 years ago | (#4920429)

In soviet star trek, Data walks away with YOU!

Vulnerable to brute force cracking (5, Funny)

commodoresloat (172735) | more than 11 years ago | (#4920431)

Gimme your watch, punk!

Re:Vulnerable to brute force cracking (2, Funny)

Tolchz (19162) | more than 11 years ago | (#4920457)

Actually I believe the term is "rubber hose" cryptanalysis

Sounds like fun... (2)

Grip3n (470031) | more than 11 years ago | (#4920433)

Great! Now I'll have a growth on my arm from my ZIA wristwatch to go along with my brain tumor from my cell phone!

hmmm... (3, Interesting)

jasno (124830) | more than 11 years ago | (#4920434)

What about using some kind of biometric data, like key cadence, or a profile of typical mouse movement characteristics (like icon overshoot?) to do it? That way its totally seamless, although one could still do some damage as it would take a few input events to establish the identity.

Sure, its not foolproof, but who wants to wear an identifying token?

Re:hmmm... (5, Funny)

pboulang (16954) | more than 11 years ago | (#4920459)

... or maybe some secretly hidden sequence of key presses?

Re:hmmm... (0)

Anonymous Coward | more than 11 years ago | (#4920518)

Some colleagues and I have been working on just such a device for the past four years. Unfortunately, we keep hitting a brick wall. We are having a problem, maybe you /. folk can help.

Specifically, we are trying to develop some sort of device to relay a secret code into the computer. So far we have been working on a button-based device, but no luck.

Thanks!

Always look on the bright side of things. (1)

Asterax (522761) | more than 11 years ago | (#4920436)

Even if ZIA encryption method ends up being broken by/a hacker(s), you still get some cool jewelry to show off to your friends.

A possible flaw. (0)

Anonymous Coward | more than 11 years ago | (#4920437)

To crack into your system, a thug need only crack your skull, take the watch, and then log on.

Non-PDF version (2, Informative)

David_Bloom (578245) | more than 11 years ago | (#4920439)

For those of us who don't want the Acrobat plugin crashing our browser: Google's handy PDF->HTML cache [216.239.33.100] .

Something's missing (5, Interesting)

Safety Cap (253500) | more than 11 years ago | (#4920442)

(from the article)
At the beginning of the process, the user enters a password on the watch~.
Isn't the point so that lazy people don't have to be bothered with remembering passwords? Doesn't this defeat the purpose? (sigh)

What happens if you take your watch off and leave it next to the computer? It never encrypts!

Worse yet---what happens if your watch gets stolen? Now you can't get at your data! Better make sure you get the Casio [casio.com] watch option instead of the Breitling [breitling.com] . No one would want to steal a Casio POS, so you should be safe.

Sad news for the slashdot community (-1, Troll)

Anonymous Coward | more than 11 years ago | (#4920443)

In doing family research, I found out that my grandfather died at the Auschwitz concentration camp. This is very upsetting to me. It seems he got really drunk one night and fell out of his guard tower. Please send condolances.

Pacemaker plugin? (1)

DoctorPhish (626559) | more than 11 years ago | (#4920444)

DriveCrypt [drivecrypt.com] has options for quick-kill and hotkey unmounting of encrypted volumes, and since this looks like it does the same thing, only better, maybe they could look into making it erase or publish the contents of the encrypted volume after receiving a distress call from the user's pacemaker?
Now _there_ is a deadman switch!

you call THAT secure? (2, Funny)

SHEENmaster (581283) | more than 11 years ago | (#4920445)

I have a v8 engine block set to fall on my hard disk if I'm away for more than five minutes (3 minute walk to fridge(coke!) and back)!!!

Your security is nothing compared to that!!!!!

Re:you call THAT secure? (0)

Anonymous Coward | more than 11 years ago | (#4920521)

remind me to call you with a telemarketer Nigerian scam next time you get up for a Coke.

Oh geeze... (1)

Obliterous (466068) | more than 11 years ago | (#4920447)

My watch battery is dyin$^%*&^@#$SD$#@#XVSDF$%@MDFSCVNL%$#^$*@#)(*&!$@

----End of line.

is currently a wristwatch with.... (2)

teamhasnoi (554944) | more than 11 years ago | (#4920451)

a processor running Linux designed by IBM.

Soon to be a chip implanted in your hand.

Don't forget the barcode on the forehead!

I'd much rather computers go wearable than implantable...

Why a Linux-based token? (0)

Anonymous Coward | more than 11 years ago | (#4920452)

... when a smartcard-based solution would've probably made it as well for a fraction of the price?

Use my technique (4, Interesting)

ekrout (139379) | more than 11 years ago | (#4920454)

I keep all mission-critical and government-classified information on portable USB Flash DRAM-based storage devices. They're incredibly portable and can be brought to the gym, in the car, to work, back home, swimming, hiking, biking, etc.

To be perfectly honest, I just can't bring myself to respect anyone who would leave a $4,000 laptop with supposedly top-secret information on it sitting out on a cafeteria table or something while they go sit in the bathroom and read the paper.

Just stick with portable USB drives. They're cheap, efficient, fast, and more secure than any fly-by-night research project out there right now.

So tell us, ekrout (-1, Troll)

Anonymous Coward | more than 11 years ago | (#4920534)

What top secret government classified information is on your USB drives? Your tentacle rape anime porn?

Re:So tell us, ekrout (-1, Offtopic)

Anonymous Coward | more than 11 years ago | (#4920620)

No, but if you're nice I might tell you where I keep my USB drive when I go swimming.

-ekrout

Re:Use my technique (0)

Anonymous Coward | more than 11 years ago | (#4920579)

USB Flash DRAM-based storage devices

Flash memory is not DRAM.

The Adventures of Jennifer Lopez (-1, Troll)

Anonymous Coward | more than 11 years ago | (#4920458)

Another tiring live performance. These performances always took a lot out of Jennifer Lopez. Dancing and running across the stage for this amount of time was always exhausting.

But besides being exhausting these dynamic performances sometimes also had another effect on Jennifer. Because she moves so much and so fast on stage for such a long period of time, sometimes the latina's "pipes" would loosen up to the point where she needs a half hour of "retreatment" into the ladies' room to relieve herself. So as soon as she got off stage, she went straight for the girly potty room. She went inside, the usual sweet scent of a ladies' room penetrated her nostrils. She went into a stall, closed the door, lifted her miniskirt and lowered her panties. The wetness of the panties she had grown accustomed to. The movements were causing the crack of her ass to sweat and after two hours of dancing, the panties were lodged completely into her brown crack, soaking up all of the sweat present. Jennifer sat down, and allowed her insides to do most of the work. But for some reason this time it didn't go too well. Where usually the bowel movement was quick and smooth. This time it was like it struggled against being forced out. So Jennifer applied some pressure on her lower body, but it wouldn't help.

"This is going to be a long one," she said to herself, after which she heard the door to the ladies' room open. A woman, probably one of the dancers, went into the stall next to Jennifer's. The sultry singer and actress heard the woman sliding down her panties, snapping the elastic band. As Jennifer struggled to push the content of her guts toward her backdoor, she couldn't ignore the sounds being made in the stall next to hers.

The lady was moaning, the crackling of a turd sliding out was loud enough to be heard, and Jennifer couldn't deny a smile as she heard a fart thundering in the hollow sounding ladies' room.

"Whoa, that sounded like a real birth," Jennifer said casually to the mysterious lady in the next stall.

"Like you wouldn't believe," a womanly voice answered. "I've been holding this up for over half an hour."

Jennifer knew the voice. It belonged to Natasha, a stunningly beautiful black dancer, recently added to the group.

"Yeah, I can sympathize. I've been holding up myself. For over an hour."

"So you must be relieved to get rid of it then, huh?"

"I wish. For some reason it just won't go as easily as it should."

Jennifer heard the girl wipe her privates, pull up her panties and flush the toilet. Then she spoke again.

"You know, this might sound odd. But I have a successful method on how to make it go more smoothly, if you're interested off course."

"Well, I don't want to spend my entire day in here. So if it helps, I'd be happy to know what that method is," Jennifer said honestly.

"Okay. But in order for me to help, you'll have to let me in there."

Jennifer unlocked the stall, and saw Natasha entering. Once again Jennifer was in awe of the beauty of the girl. Her chocolate skin was shiny from the sweat of the performance. And her face resembled that of Brandy Norwood, the R&B singer. Wide eyes and a wide smile.

"Can I...you know...take a look to see if I can see the problem?" the girl asked in a light innocent voice.

Jennifer felt somewhat awkward. Although she was a closet bi-sexual. And had been in this position with several guys and some girls, she still felt a bit weird. But the girl wanted to help her out with her problem, so Jennifer leaned back against the wall, lifted her legs, and placed her feet on either side of the girl against the door of the stall. Natasha made no hesitations in dropping to her knees and staring at Jennifer crotch area. Without Jennifer noticing or realizing, the girl took pleasure in looking at Jennifer's great looking pussy. Shaven at the sides so no hair would be visible in bathing suits, but hairy on top and on the lips, lips that were long and thin. Looking further down her breathing went faster as she looked straight at Jennifer's asshole. A dark, wrinkled pucker that was pouting outward.

"This may sound a bit strange, and if you don't want to answer you don't have to, but...do you ever put your finger in your anus, for instance when you masturbate?" the girl asked while never taking her eyes off of Jen's asshole.

"What? No! No...I mean, I've never thought about doing that. Why do you ask?"

"Well, because my experience is that if you regularly finger your anus, you will experience far less constipation. You see, by fingering your...ass, your muscles learn to relax when pressure is applied. And it loosens up easier."

"I never knew that. So what your saying is that...if I finger my asshole, I should have no problem relieving myself?"

"That's right. That's why porn actresses have enemas before doing anal. So that it doesn't become a mess after the guy pounds her hole so long."

"I don't know. I've never done this. I don't know what to expect."

"You know it's actually quite nice, once you get used to it. If you like, I could try."

Jennifer thought about it and started smiling. "I would like that."

"Okay, first I wet my middle finger in my mouth like this"....... "Then I lubricate the outside of your anus with my saliva to make it slippery".... Natasha rubs the tip of her middle finger all over Jennifer's asshole, which contracts and relaxes under the black girl's touch.

"Then I enter." Natasha now slides her finger all the way into Jennifer's ass to the knuckle. Jennifer closed her eyes and couldn't suppress a moan, she just couldn't. Natasha noticed and knew she gained the desired effect as she started sliding her finger in and out with increasing speed. At one point there were even faint sounds of sloppiness as Natasha was really frigging Jennifer butt. "UUUHMM...that feels good," Jennifer moaned. "Please keep doing that."

"I intend to," Natasha said with a husky tone in her voice. "As a matter of fact, I think you're ready for a little something extra." The ebony girl slid her finger out of Jennifer hole, took a whiff of it, obviously liking the smell, and stuck the digit, along with her index finger into her mouth. After wetting the fingers with lots of spit, she drilled them into Jennifer shitter with one move, and started to rapidly fuck the Latina's ass with them. Natasha knew she had the singer almost where she wanted her...on the edge.

"Oh shit...your fingers feel so good in my ass. Keep fucking me with your fingers. That's it. I never knew it would feel this good."

"Puffy never did this to you, huh," Natasha asked with irony, "He probably thinks it's dirty. Well, fucking a beautiful ass like yours with my fingers is never dirty to me."

Natasha started twisting her fingers around inside Jennifer's ass and felt her ass become more slippery. She took her fingers out again and saw that Jennifer's asshole remained open for a short period. She then looked at her fingers and noticed her fingernails had a little bit of shit on them. She stuck her fingers in her mouth and licked Jennifer's shit from her nails.

"Now it's time for your reward," Natasha said and buried her face in the crack of Jennifer Lopez's ass. She lapped over Jennifer's pouting pucker and used a tongue full of saliva to lube the latina's shithole up. She then started butt-fucking Jennifer with her tongue like a real ebony butt slut. My God, how she enjoyed the sweaty, musky smell and pure, bitter taste of Jennifer's asshole.

Sloppy slurping sounds emanated from the tongue-asshole connection as the black beauty licked and sucked away at Jennifer Lopez's ass with abandon. Jennifer looked down at that dark face between her gigantic butt cheeks and shivered at the sight of that soft pink tongue grinding into the swollen rim of her rectum. She reached out and ran her fingers through Natasha's black hair, before grabbing her by the back of her head and pulling her face tight against the moist crack of her wide, beautiful ass.

"Oh my God. Natasha, you're licking my ass so good. I never knew a tongue in my ass would be this nice. Just don't stop. Keep fucking my butt with your tongue. Oh yeah, that's it."

As Natasha kept drilling her tongue deep into Jennifer's anal orifice, she closed her lips over her pucker, and started sucking on her ass with force. The smacking sounds of her lips on the latina's asshole filled the ladies' room, and it continued to do so for minutes.

"Shit, I feel something. Oh Natasha, I have to...I have to fart. Your sucking of my asshole makes me have to fart. Quickly, take your mouth off my ass."

But Natasha didn't budge. She kept on sucking right until an enormously loud, wet-sounding fart simply blew her lips off Jennifer's pucker. The odor of the hot gas penetrated the black dancer's nostrils and had her so over the edge, excitement-wise, she lost control of her calm self and started yelling.

"That's it, you fucking slut. Fart in my face. Fart that smelly shit right in my face. I love to smell that shit."

Jennifer needed a few seconds to understand what drove Natasha to enjoy something like this, but soon understood that the sheer depravity of it, the perverted nature of all of this, is what drives someone like Natasha wild, and Jennifer decided she was starting to like this nasty stuff as well. She could never deny to herself that she immensely enjoyed the feeling of someone sucking her ass. And knowing that same person actually gets wet smelling her farts.

Natasha had turned down the volume of her voice again and plainly spoke to Jennifer.

"Now that you farted, it means that it won't last long for the rest to come."

The beautiful black woman again started drilling her fingers in and out of Jennifer's swollen poopchute, and noticed the grimace of wanton lust on the latina's face.

"You horny bitch. You sure like this, don't you? Helping you take a shit, my ass! You couldn't wait to feel my fingers and tongue up your ass. You probably farted in my face deliberately. Blowing that shitty hot gas into my face as I sucked on your shithole. Tell me! Tell me you were dying to have me come in here and eat out your ass."

"Oh God. You're so right. You're so fucking right. I heard you shit, and smelled it. And I loved the smell of your fart. I was so hot imagining what you would look like taking a shit. Seeing the turds being pushed from your black ass. I love this. I love your fingers in my butt. Your tongue in my butt. And I loved farting in your face. It's so nasty. It makes me feel so hot and nasty doing that. I would love it so much to shit here as you watch my ass. The thought of you watching my asshole up close as I shit drives me crazy. Will you do that? Will you watch me shit?" Jennifer was shivering on the toilet bowl as she spewed the most perverted, depraved language. She had never talked like this. The nasty black dancer had brought out a side in her she never knew existed.

"I wanna watch you shit, Jennifer. I wanna see those turds popping from your nasty brown hole. Here, watch this, Jennifer. Watch as I pull my fingers from your ass and enjoy the taste."

Right after the final words, Natasha slid her fingers from Jennifer's ass, and showed them to Jennifer. Jennifer saw Natasha's fingers, coated in her shit, and then saw the ebony woman starting to lick her fingers. Looking straight into the celebrity's eyes and with a wild, wanton expression on her face, Natasha licked the layer of dark-brown crème right off her fingers, casually taking her tongue back in her mouth now and again to experience the taste, and letting the sticky shit slide down her throat. After she had completely cleaned her fingers, she looked at Jennifer with a serious expression.

"You're ready. Now push your shit out. Here, spread those legs wider so I can have a nice look, raise those knees. Support yourself and let me hold those ass cheeks spread for you. Now do it."

Jennifer never felt so utterly exposed in her life, sitting there on a toilet bowl with legs spread and knees raised, with a black woman's face mere inches from the sweaty crack of her ass. But the depravity of it, the nastiness, it made here feel so damn lewd, so hot. Jennifer pushed, and pushed, and an earth shattering, meaty fart blew from her pucker, right into Natasha's face, who squealed with joy. And then, it rolled. Jennifer felt the warm content of her bowels slide down towards the opening.

Natasha was still lingering in the mind-blowing smell of Jennifer Lopez's fart, when she saw a thick brown turd sliding slowly out of her ass. The crackling sounds were almost deafening to her as the pungent scent of Jennifer's shit filled her nostrils. The latina singer groaned aloud as she looked at the black dancer's face, and pushed a long turd all the way out, until it broke off and plunged into the bowl, leaving a brown shitty ring on the rim of her asshole. She was completely in the same mind state as Natasha now, as she whispered: "There's more where that came from. But I want you to SUCK it out."

Natasha looked into Jennifer's eyes with a surprised grin, as if she won a lifetime achievement award and didn't expect it.

"Suck it out? Oh Jesus. That's so hot. I'd love to suck the shit from your ass."

"Well then. What are you waiting for?"

That was Natasha's cue. She fused her open mouth to Jennifer's greasy brown asshole and sucked hard on the latina's pucker. Slurping sounds filled the stall and Jennifer groaned increasingly louder as she felt the ebony girl sucking on her sloppy butthole. Natasha enjoyed the bitter taste of the sticky shit that she sucked into her mouth.

"Oh Jesus Christ. That feels so fucking good. I don't care anymore if anybody hears me. JUST KEEP SUCKING MY ASS. SUCK THE SHIT FROM MY BUTT! YES!."

Natasha complied and kept slurping away at Jennifer's dirty ass, when all of a sudden she felt a spongy, warm nugget slide from Jennifer ass into her mouth.

She looked Jennifer straight in the eyes as she moaned and ate the latina's shit.

"Oh God, yes! Eat my shit. Do you like it? Do you like the taste of my shit? Better savor the taste, because it was the last piece."

Natasha chewed the brown piece and after squashing it enough, swallowed it.

"You done with that," Jennifer asked huskily, "then open your mouth, because I've something for you to drink to wash your mouth. Open up for mommy."

Natasha was wondering what the sultry singer meant, but opened her mouth as she had her face inches from the latina's steaming crotch.

"Oh yes, I feel it coming. Get ready."

And when that last word was uttered, Jennifer let go of her bladder, and a steady, yellow stream of warm piss arced from her pisshole straight into Natasha's face. The black dancer squealed in delight as she felt the smelly warm liquid splash her face, and moved her face so she caught the forceful stream straight into her mouth. The hissing sound of the piss leaving Jennifer Lopez's cunt and it hitting Natasha's tongue and roof of her mouth was like music to their ears. Natasha swallowed wave after wave of Jennifer's salty piss and continued to let her tongue be drenched and her mouth be filled.

"Christ, you look so hot drinking my piss," Jennifer whispered as a thunderous fart once again crackled out of her brown asshole.

All good things come to an end, and this includes the content of Jennifer's bladder, as the stream decreased in its strength and it lowered until the last spurts just gushed over the crack of Jennifer's ass.

"Now please clean me," Jennifer said.

Natasha continued her earlier job and again lapped through Jennifer's crack, licking the piss from it and licking off the remainder of shit on the swollen rim of her bulging asshole. After about 2 minutes Jennifer was squeaky clean and pulled her panties up as she looked Natasha in the eye.

"You made me fell better than I have ever felt. Nobody has ever gone this far to give me a good time," Jennifer said.

"It always was my dream to pleasure you," Natasha responded, "I just had to grab this opportunity. My wildest dream was to suck your ass, and you made my fantasy come true. And I just want you to know, Jennifer, that if you ever want me to give pleasure to your pussy or ass again, you just have to tell me."

"Natasha, I would like it very much if you want to be my buttslut. We can have crazy times together on the road. As far as I'm concerned, you can taste my ass whenever you want, because I just love the feeling of your soft, wet tongue fucking my butt."

"Oh Jennifer, you just made me happy. But I have a question. Would you like to service certain body parts of mine just as I service your ass?"

"Just name it," Jennifer said in anticipation.

"Tell me, Jennifer, would you like to suck and lick my toes from now on?"

"Natasha, as far as I'm concerned, you can fuck my ass with your big toe, and I'll clean your toe with my tongue."

Jennifer Lopez and Natasha would have many crazy, lustful adventures from that point on.

CONGO COONS RAPE NUNS (-1, Troll)

Anonymous Coward | more than 11 years ago | (#4920461)

...seems they really enjoyed it before their necks were slit.

hmmm... (2)

Lord_Slepnir (585350) | more than 11 years ago | (#4920469)

The token... is currently a wristwatch with a processor running Linux designed by IBM.

hmmm....we have a watch, it obviously has some sort of wi-fi networking if it can keep in touch with the computer. How long until someone is assasinated by launching a DoS attack against his watch? It may not kill, but at least cripple as the watch burns its way through the flesh as the poor NIC on it is overloaded.....

For Regular Business Users? (2)

webword (82711) | more than 11 years ago | (#4920470)

This is yet another device created by geeks for geeks. These researchers probably think this is a good idea, but do they really think it is a good idea for most people? How much market analysis was done? How much usability testing? Well, at least they are targeting corporations and large organizations. There might be some money in it down the road.

how about replay attacks? (0)

Anonymous Coward | more than 11 years ago | (#4920475)

looks like a risk of interception.

Very Interesting (-1, Troll)

Anonymous Coward | more than 11 years ago | (#4920486)

How a totally segregated organization like the Congressional Black Caucus (CBC) blasts Senator Trent Lott for making segregationist comments....do I hear double standard????

New cubicle (1)

rockwood (141675) | more than 11 years ago | (#4920487)

So all the guy/gal in the next cubicle has to do is monitor the IR transmission/receiver and copy your key... or am I missing something?

Can you occassionally change your key?

I don't like this idea, being that these 'products' give your employer a more solid ground to say "It must have been you that deleted the files and crashed the server with the worm you released after we gave you a bad QA assesment." Afterall, it had to be you... your the only one with "The Crypto Key".

How would you prove it otherwise that it wasn't you?

I like my passwords, the ease of changing them increases my frequency of doing so. And for those that change their pwd's to easily remembered terms due to your lack of brain power - Well then you deserve what you get. If you can't remember a password, and have the ability to remember that password as it changes every few days or weeks - then you shouldn't be sitting at a computer to begin with. I constantly change my passwords and use a different password for nearly 30+ things... all password are no less then 11 or 12 highly mixed random characters. And while I am no idiot, I am far from having a photographic memory. So as the old dieters solgan goes... "If I can do it, so can you"

Ehhh... (2)

Guppy06 (410832) | more than 11 years ago | (#4920491)

Security for the people too lazy to practice good security habits. Yay. Although I suppose this will make life easier for certain sysadmins...

At any rate, my question is "When will this be used to make smart guns?"

Re:Ehhh... (0)

Anonymous Coward | more than 11 years ago | (#4920581)

To answer your question. Companies like Colt Firearms are already testing devices to lock guns from firing if the person holding the gun is not wearing the special security device. Currently a watch (what a surprise).

Dongle? (1)

macmark (243711) | more than 11 years ago | (#4920504)

Isn't this just a fancier type of dongle?

Why do Brits have disgusting teeth????? (-1, Troll)

Anonymous Coward | more than 11 years ago | (#4920506)

Filthy rotting shit stained teeth that smell like dog shit. Even wealthy parasites like the royal family have pathetic blackish-yellow decaying teeth. Why is that?

facial recognition (2)

Nathdot (465087) | more than 11 years ago | (#4920508)

More and more laptops/palmtops incorporating a camera as part of the design, so why not use facial recognition to lock the pc.

Short of growing a beard before you get back to the laptop it'd be a cheap workable solution.

Then you don't have to remember/wear some crazy ass security dongle.

Re:facial recognition (-1, Offtopic)

Anonymous Coward | more than 11 years ago | (#4920550)

Oh, for a second there I thought you said FECAL recognition!

Is it really so hard? (5, Interesting)

NineNine (235196) | more than 11 years ago | (#4920511)

When you stand up, hit ctrl+alt+del. When you sit down, type in your password. I had to do it at one company, and now it's just habit. Not exactly a tough thing to do. I think that these guys are trying to solve a non-problem.

Re:Is it really so hard? (4, Insightful)

LostCluster (625375) | more than 11 years ago | (#4920631)

There are business analysts (remember what the first four letters of that word are..) who add up all those seconds lost to things like hitting Ctrl-Alt-Del and typing their passwords over a year, then multiply it by the hourly wage to determine how many dollars are wasted by that task. If that step is replaced by a passive process, it theoretically makes employees more effective... YMMV in actual use.

But, what if... (1)

The Jonas (623192) | more than 11 years ago | (#4920512)

...you lose your token?!?

I thought dell lattitudes did this? (2)

t0qer (230538) | more than 11 years ago | (#4920513)

With a combination of a prickly bios password and some sort of hardware lockout?

I had a crackhead friend bring me one of these recently asking if I could make it work. I spent about 10 minutes reading posts about the hardware lockout and figured out it wouldn't happen without him calling dell. It was of questionable origin and he did not want to do that.

He then insisted on leaving it at my house for two fucking weeks insisting that i'm a computer genius and I could figure it out, despite the documention I had read.

Two weeks later he came back accusing me of being too lazy to have a look at it. Isn't that just the way it goes when you're the computer fixit guy?

Re:I thought dell lattitudes did this? (0)

Anonymous Coward | more than 11 years ago | (#4920626)

Shoulda called Dell and told them the Serial number and ask if it had been reported stolen :)

fUx0r your buddy, maybe there was some $$$ in it for you after all!

But boss I can't turn in those TPS reports (0)

Anonymous Coward | more than 11 years ago | (#4920533)

My watch crashed and I've been on hold for IBM all afternoon

Encrypts the data? (3, Interesting)

dagg (153577) | more than 11 years ago | (#4920549)

The system protects data by automatically scrambling it the moment users walk away...

What does it actually encrypt? All sensitive data? I doubt it could do that in 5-6 seconds. Also, how do you decrypt the data if you lose your key? Or what if you fire the employee and don't get the key back? How will you get the data, then? Is there a back door for sysadmins?

Re:Encrypts the data? (2)

Mitreya (579078) | more than 11 years ago | (#4920623)

What does it actually encrypt? All sensitive data? I doubt it could do that in 5-6 seconds.

It probably encrypts your passwords.txt so that the thief of the laptop can not compromize your *other* accounts including that porn site one...
Or maybe it is really smart and it keeps both copies of your data -- encrypted and unencrypted. The second you walk away the unencrypted copy is erased :) Dunno about the decryption part happening in 5 seconds though... undelete?

Jeez, just use on-the-fly encryption already (3, Informative)

HEbGb (6544) | more than 11 years ago | (#4920551)

A token can be easily misplaced, duplicated, or bypassed. A password is NOT a big deal to enter when you sit at your desk. If they're too lazy/clueless to enter a password, they shouldn't be responsible for any secret information.

Use a program like Scramdisk [clara.net] or the commercial version Drivecrypt [drivecrypt.com] . Keep all of your critical files on the encrypted partition. When you leave your desk, activate the screenserver with a keystroke.

Unless someone knows your password, you're safe. If they reboot, the encrypted disk is inaccessible.

What's the big deal?

Practical? (2)

Sandman1971 (516283) | more than 11 years ago | (#4920556)

I don't see this as being very practical.

How fast will this encrypt/decrypt data? I probably have well over a gig's worth of 'sensitive' documents and data on my laptop, stored in various directories (and unfortunately the approved OS at work is winblows). Encrypting will not take mere seconds.

More often than not, when I'm not at my desk I'm a few cubicles away working with other co-workers. Sometimes I'm not away from my desk for more than 10-15 seconds. Right now if I suspect I'll be gone from my desk for a while, and it's not in plain view, I'll turn on my screensaver (password locked) with a touch of 2 keys. This system sounds like it will arbitrarilly start encrypting my data as soon as I'm outside a specified range. If I'm away for just 15-20 seconds, this seems very impractical. Not to mention other things, like forgetting the transmitter at home (how many of us have forgotten our work passes at home once or twice?), having the battery die, etc.... On such occasions you'd be totally locked out from accessing your own data.

No thanks, this seems way too impractical for my taste. Move along, there's nothing to see here.

... and when the battery dies? (1)

blackwizard (62282) | more than 11 years ago | (#4920558)

IIRC, these watches only have a few hours of battery life at most. Seems obvious that this aspect would have to be improved. I guess it could be a good excuse to stop working for awhile -- "But Boss, I'm charging my watch!"

On the other hand, if it was integrated into something like a PDA, it might work better. My Palm Vx (grayscale) has a pretty damn long battery life; however I rarely use it for as long as I use a PC. Also, the fact that I turn it off when I'm done (or it shuts itself off) surely prolongs the battery life. And my Palm isn't transmitting any signals to my PC, either...

deja-vu all over again... (1)

IchBinEinPenguin (589252) | more than 11 years ago | (#4920567)

... and I think last time one comment summed it up:

What makes you think users who write passwords on post-it-notes stuck to the monitors aren't going to blue-tack the dongle to the laptop for "ease of (ab)use?"

New technology only changes the attack mechanism (3, Insightful)

JayBonci (92015) | more than 11 years ago | (#4920570)

While I applaud these people for making steps to make it harder to casually get information off of laptop computers, it still does not stop other attacks on such a system. Flooding the laptops area with uniformly strong signal that matches the watch's key would be as difficult as acquire-and-replicate. There seems to be a smart card like system with keys, and key encrypting keys.
It's very comprehensive, and it addresses many aspects of the social and technological attacks.

In my mind, the weak link here is clearly the watch. Watch technology isn't very complicated (read: very big), and how many designs could their possibly be? If one knows where the hardware information is located, a system replacement under the face, and you've got some issues. How many people wear watches to bed at night? Or in the shower? Difficult, but possible

A quick couple of replacements, and you have a watch that has a short range transmitter also transmitting the information that you'd need to dissolve the encryption link, and maybe begin a traditional man-in-the-middle attack. Once you see what cards the watch is holding, shouldn't the rest of the exchange be trivial?

While this is a great mechanism for an encryption scheme, what attacks are there against the physical and social component? These are the items of which spy thrillers are made, and will probably (hopefully) never come into play.

All in all, an excellent read from the UMich folk, and they have my applause.

--jaybonci

Watch out (1)

kzg (634262) | more than 11 years ago | (#4920575)

Wow! Linux was designed by IBM!

Sounds Like Someone's Trying to Get Funding (1)

Ashetos (634147) | more than 11 years ago | (#4920576)

Seriously, this is the most BS sounding "security solution" I've heard of in a while.
It seems like the Prof. is just trying to get some publicity so he can bring in the next grant. I'll be impressed when someone comes up with an elegant, efficient security concept, not something that needs $10k just to work.
The truth is, secure data is now being stored on PDAs and Cell Phones. IMO, these "minimal" or rather specialized devices will need to have integral data security features, but with much less overhead and dedicated hardware.

TURN IT THE FUCK OFF (0)

Anonymous Coward | more than 11 years ago | (#4920577)

that's right. problem solved.

nothing new... ibuttons and smart cards (0)

Anonymous Coward | more than 11 years ago | (#4920580)

This is nothing new... ibuttons and smart cards. Yet another retarded professor thinking he did something new...

The IButton [ibutton.com] did this more than 3 years ago. Just touch the ring to the blue dot.
And my sunblade just needs me to swipe a card. This is a method that leaves itself open to bigger hacks than the others... listening to the wireless protocol, copying it, and logging in as someone else.

Fry the Cache (2)

cranos (592602) | more than 11 years ago | (#4920585)

From what I understand, this new system decrypts the cache when you come within a certain distance and re-encrypts when you go past that distance, does this mean that doing the hokey pokey (you put your left foot in...) could lead to a system crash??

Re:Fry the Cache (2)

cranos (592602) | more than 11 years ago | (#4920595)

Im sorry I have to write this. Imagine an entire office of Cubicle dwellers doing the hokey pokey just to crash their machines.

Damnit I need a smoke.

Not even close (1)

krray (605395) | more than 11 years ago | (#4920601)

Not even close or interested. What WOULD interest me is a touch pad that could read my thumbprint. I walk away it would idle locked, or I could just move my mouse somewhere or hit some key combo. To[re-] authenticate just give it a finger print...

I've personally added keyboards with touch pads for general/quick mouse movements -- after being "forced" to use on a laptop. A mouse _is_ quicker and I'll grab that for heavier mousing.

A fingerprint would also allow me to give the computer 'the finger' if I felt it was needed as well...stress relief and all.

Why not mod instead?? (1)

malarkey (514857) | more than 11 years ago | (#4920606)

Mod your computer to require a Pass-Key [gmautoworld.co.kr] to allow any input or output.

We covered this a few months ago... (1)

Eric Smalley (561923) | more than 11 years ago | (#4920607)

... with a little more detail. Radio ID locks lost laptops [trnmag.com] TRN Sept. 4/11

uhhh... (-1, Troll)

Anonymous Coward | more than 11 years ago | (#4920608)

Sounds silly. You'd have to really fine-tune that distance setting. What if you have your PC near a wall, then you get up, go into the next room, and happen to just be on the other side of a thin wall? Is your box now open for the world to see?

What if you have to reach down and scratch your freshmaker with your tokenized hand? Does the screen blink off for a second? How about if you drop your pencil?

Back to the freshmaker scenario: suppose I've got my laptop in the shitter with me (don't laugh I do it all the time) and I'm pulling my meat to some quality tentacle rape anime porn that I downloaded from our good friend ekrout. Does the screen blink on and off with each stroke?

I'm not too keen on the idea. Just activate your screen locker when you get up, then enter a password when you sit down. Not a big deal.

Weakest Link (2)

Dolohov (114209) | more than 11 years ago | (#4920610)

As always, the weakest link will be the user. I can just see some schmuck decide that he's tired of waiting six seconds every time he gets back from the water cooler, and so he leaves the wristwatch next to the laptop at all times.

SafeSex (0)

Anonymous Coward | more than 11 years ago | (#4920618)

http://www.nullsoft.com/free/safesex/

for your notes anyway :) and for windoze only heh.
Load More Comments
Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>