Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!



Lavabit Case Unsealed: FBI Demands Companies Secretly Turn Over Crypto Keys

Blaisun Re:What moron judge allowed this? (527 comments)

I wholeheartedly agree with what you are saying, and i would agree that it would apply to communications that stayed within the confines of the Lavabit encrypted Mail system. But the second an email leaves and head to another email server, it is now public and would no longer have an expectation of privacy. the email headers would have to be in the clear in order for the email to reach its destination.

about a year ago

Five Charged In Largest Hacking Scheme Ever Prosecuted In US

Blaisun Re:Punishment out of proportions? (84 comments)

That is assuming that those charges are for the same crime. More than likely, with the laundry list of business hit, that they conspired on some, and actually performed others.....

about a year ago

U.S. District Judge: Forced Decryption of Hard Drives Violates Fifth Amendment

Blaisun Re:My goodness (417 comments)

I am not confused at all. The main difference to me is their ability to obtain with or without your consent. For material objects, they can issue a warrent, and by force take anything in your possession with or without your consent. Something locked in a lock box, they can break it open to obtain whats inside. They can break into safes etc. They can take the hard drive out of your computer, etc, etc, etc.... They should not be able to force you to participate in your own prosecution by providing any information whatsoever. You have the right to remain silent..........

about a year ago

U.S. District Judge: Forced Decryption of Hard Drives Violates Fifth Amendment

Blaisun Re:My goodness (417 comments)

By the way, in case somebody doesn't understand what the 'fifth' is, it's the lack of authority by the government to force somebody to testify against themselves.

To understand its roots, you have to look back at when kings and other rulers would capture and torture somebody to get a 'confession'. When people are tortured, most will confess to just about anything, so torturing is a very simple way to get a conviction (or to murder somebody, whichever comes first) and using torture to get a conviction can often lead to murder at the end of torture anyway.

But that is the origin, when somebody says: "I take the fifth", what they mean is that they will not testify against themselves. But to testify against yourself you have to be a suspect, you have to be the one on trial, that's why Lois Lerner, the IRS director "taking the fifth" makes no sense, she wasn't on trial.

Saying: 'I am taking the fifth' only makes sense when you are on trial or a suspect of a police investigation, but it doesn't make sense to say "fifth" when you are testifying to Congress.

You can refuse to answer questions, but invoking the fifth amendment has no meaning in that context, AFAIC she admits her guilt and/or lack of understanding of the law when she says that.

OTOH in this case I am NOT convinced that the fifth amendment is relevant in cases of encrypted data!

Forcing somebody to unlock their data is not the same as forcing somebody to sign a statement. After all, it's real data, it's already there. By being forced to unlock the data you are not being forced to say something new, it's not new information that is on the disk, it's not like you are forced to say: I am guilty, here is the body.

You are forced to open a box that may have data providing that you are guilty, but that information is already there and it's not new, you weren't forced to first create that data and then give it up, you are forced to open the data that existed already in a form that is not attached to you, it's independent of you, it is already existing outside of you.

How is that equivalent of being tortured (or punished) into saying the words: I am guilty, here is the stuff you are looking for?

I am just being pedantic here, the fifth is not necessarily a protection against being forced to give up data that already exists that you do not have to create or produce at the moment of giving it up.

I disagree with your take on the "fifth", you should be able to take the fifth on any statement that COULD be used against you in court, just because you are not there now, doesn't mean that the statement you make will not land you there.

in addition, i will also take the counter point on decrypting the HD. i take the essential meaning of the fifth as to you should never have to provide evidence against yourself. By providing them with the password, or whatever the key is, to the encrypted HD, you are providing them with evidence that they would not be able to get with out your assistance. If they are able to get the evidence(brute force decryption, or what have you) without your assistance, with a warrant, that is fine, but you should never have to assist, in any way, in your own prosecution.

about a year ago

Should the Power of Corporate Innovation Shift Away From Executives?

Blaisun Re:The 60s? (149 comments)

Sorry, the 60's didn't have xbox's, the Internet, and essentially unlimited free porn to pacify them......

about a year ago

Schneier: Security Awareness Training 'a Waste of Time'

Blaisun in a perfect world..... (284 comments)

This is a rose colored glasses view. If everything was perfectly designed, perfectly implemented, and used by knowledgeable users, sure that might work. We live in an imperfect world run by lowest bidder wins, quickest product to market, "good enough" security to not get us sued. This will not change. as long as the focus of a product is to make someone money, it will only be done "good enough" with the focus being minimum invested for maximum return. I believe the security of products are getting better all the time. But the majority of the time, the weakest link in the chain of security is the user. Why do you think that Social Engineering is so widely used? Simple really........ BECAUSE IT IS EFFECTIVE. why go through all effort necessary to exploit a system when a simple phone call can net you the same result? Technical Security can only protect you so far... you have to involve users in your security plan or you are simply keeping your head in the sand....

about a year and a half ago

Ask Slashdot: Which Google Project Didn't Deserve To Die?

Blaisun Re:And now Google Drive is down... (383 comments)

yeah but it is ok when my server goes down... i am too busy trying to get it back up to need anything off of it right then...

about a year and a half ago

Time Warner Cable: No Consumer Demand For Gigabit Internet

Blaisun Re:Translation: We Don't Have Gigabit Fiber (573 comments)

agree, i want gigabit, but i am not willing to sell my kidneys for it. make it reasonable like google is, and i would snap it up....

about a year and a half ago

Google Looks To Cut Funds To Illegal Sites

Blaisun Business choice (347 comments)

I believe that Google should be able to do business with whomever they choose, if the feel that a websites activities are not up to the standards the Google wants to associate with, they have the ability to not do business with them. Its as simple as not allowing them to use the Google advertising to earn revenue on their site. desisting them from the Google search, or demoting them could be seen as anti-competitive though.

about a year and a half ago

Department of Homeland Security Wants Nerds For a New "Cyber Reserve'"

Blaisun Re:Please, just stop... (204 comments)

Really? why the hell would the sewage be connected to the clean water intake at all, let alone a scada automated one. man, there are enough real threats to be dealt with instead of spewing this hyperbolic bullshit....

about 2 years ago

Supreme Court Hearing Case On Drug-Sniffing Dog "Fishing Expeditions"

Blaisun Dogs are a tool for searching, not evidence. (451 comments)

A dogs reaction is not evidence, its opinion. Evidence should be required to violate someones privacy. Using a dog as a tool to locate the drugs once a warrant has been issued, i totally support it.

about 2 years ago

Want a Security Pro? Get Politically Incorrect and Learn Geek Culture

Blaisun Re:Right (314 comments)

LOL, really? How much is enough? People that live outside their means, or something went horribly wrong, go bankrupt. Do i want someone working for me that can't even do a simple task of maintaining their personal finances?

about 2 years ago


Blaisun hasn't submitted any stories.


Blaisun has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>