×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

OpenBSD Team Cleaning Up OpenSSL

cpghost Re:What about a re-implementation... (290 comments)

Every so called "safer" language (than C) is also less efficient. For OpenSSL, we need maximum efficiency/speed in big data scenarios, and in cases where hardware acceleration is asked for. Playing with Go, Java & Co. is a no-go here. Plus, C can be just as safe, when used properly and when code is properly audited and screened. The problem with Heartbleed was that auditing took way too long to materialize and to catch up. A bug in a, say, Go version of OpenSSL would have probably taken just as long to get discovered, if auditing happens so seldom.

5 days ago
top

Why Does Facebook Need To Read My Text Messages?

cpghost Re:Bad answer, this is a security issue (293 comments)

You are supposed to use a different phone for 2-factor authentication. If you lump all into one, what's the whole point?

about 3 months ago
top

Man Jailed For Refusing To Reveal USB Password

cpghost What was the password? (374 comments)

If he told them the password previously, but they didn't even try it, maybe the password was "F*ck you!"?

about 3 months ago
top

US Federal Judge Rules NSA Data Collection Legal

cpghost Re:Translation: (511 comments)

You have been modded funny, but what if it was indeed true? That should be a deeply unsettling thought.

about 4 months ago
top

US Federal Judge Rules NSA Data Collection Legal

cpghost Re:Counter-punch? (511 comments)

Only problem is that the American people are the targets of both punches!

Non-American people all around the world are even a lot more targets of the NSA punch, because they don't even benefit from FISA laws that protect, at least partially, Americans...

about 4 months ago
top

US Federal Judge Rules NSA Data Collection Legal

cpghost Re:NSA's entire program is useless (511 comments)

The USA will be attacked again and again, and the NSA will continue to sit on its hands doing nothing.

They may have plenty of leads, but if they lead to US persons, they are by law prohibited from even reporting them to the FBI. Blame the NSA for a lot of the current Orwellian dystopia, but not for following the law, at least once.

about 4 months ago
top

Member of President Obama's NSA Panel Recommends Increased Data Collection

cpghost Re:Not only invasive, but pointless. (349 comments)

You're assuming that all terrorists do have half a brain. Considering the kind of terrorists that blow themselves up instead of using remote controls, one can doubt that they even have half a brain. Of course, I'm NOT implying that mass surveillance would be justified, just because we're in a fight against half- or full morons, I'm just saying that there's still a slim chance to catch the less intelligent among the terrorists. Do we want this slim chance at the price of giving up freedom and privacy altogether? That's the real question.

about 4 months ago
top

Member of President Obama's NSA Panel Recommends Increased Data Collection

cpghost Re:The advisors (349 comments)

As long as he gets contradicting opinions from his advisers on every single issue, what's the harm? It's Obama's job to finally decide what to do. Coming to an informed decision means looking at an issue from all possible angles. If this Morell guy plays advocatus diaboli, so be it.

about 4 months ago
top

German Court Invalidates Microsoft FAT Patent

cpghost Re:What about FAT32 (192 comments)

It concerns patent EP0618540. Looks like FAT-32 to me, at first sight.

about 4 months ago
top

IDC: PC Shipments Decline Worse Than Forecasted, No Recovery Expected

cpghost PC != PC (393 comments)

So, I'm looking for a PC capable of running ZFS/FreeBSD on at least 8, if not more spindles. The only PC I found was some custom-made platform using a SuperMicro motherboard, 96 GB of registered EEC RAM (expandable to 512 GB) and so on, with two CPU sockets sucking up to 150 Watts or so. Somewhat more expensive than run-off-the-mill PCs, but the only way to provide redundant storage on ZFS file system basis nowadays. Basically, it's a "fat desktop" or a "desktop-capable server". Normal PC makers rarely include more than a couple of SATA ports in their machines, and there are severe limitations on RAM slots. No wonder, the PC market is dwindling fast: there's no upgrade path from a standard set a decade or so ago. Industry-PCs or servers are doing well though; they're just not for the consumer market.

about 5 months ago
top

European Commission Outlines Steps To Restore Trust In EU-US Data Flows

cpghost Re:Two Easy Steps : (75 comments)

You must be new here. There, fixed that for you:

Step 1: Dismantle the NSA...
Step 2: ???
Step 3: Profit!

about 5 months ago
top

NSA Planned To Discredit Radicals Based On Web-Browsing Habits

cpghost Where will they stop? (415 comments)

While most won't mind the NSA blackmailing (potential) terrorists using their web history, why stop there? Hasn't the NSA already blackmailed high ranking EU politicians, using the very same techniques, to ensure that SWIFT data will continue to be shared with the US, despite the European Parliament's motion to suspend this data sharing? See where all this leads to?

about 5 months ago
top

European Commission Outlines Steps To Restore Trust In EU-US Data Flows

cpghost Re:One Step (75 comments)

How do you prevent traffic analysis by using end-to-end encryption (only)? We need more than just encryption, we also need to hide the traffic somehow using obfuscating routing algorithms on a very wide scale. Ideally, everyone should participate in this activity, but that will remain a pipe dream of privacy advocates.

about 5 months ago
top

European Commission Outlines Steps To Restore Trust In EU-US Data Flows

cpghost Re:Step One: Destroy the NSA Data Center in Utah (75 comments)

Even without Utah, the NSA can still access all data at Google, Facebook, Yahoo!, Amazon, SWIFT, et al. data centers through back doors. There should be no need to mirror all this at their own facilities. NSA's data centers will collect the remaining scraps, like phone calls, metadata etc, and for this, they don't need Utah, they have enough capacity of their own already. Utah is for future growth, but that's another story.

about 5 months ago
top

European Commission Outlines Steps To Restore Trust In EU-US Data Flows

cpghost Re:Screw the EU (75 comments)

Of course there are surveillance plans running in EU also, but not necessarily anything as massive and intrusive that NSA is conducting.

Who knows? At least CGHQ has been doing some pretty heavy surveillance and spying on an international level too in recent years. Never underestimate the capacity of a government hellbent on eavesdropping everything that is being sent down the wire.

about 5 months ago
top

European Commission Outlines Steps To Restore Trust In EU-US Data Flows

cpghost Re:What's wrong with cutting the wire? (75 comments)

There's no "reform" unless the US stops breaking ITS OWN LAWS.

Even if the US abode by its own laws, spying on foreigners, including EU Citizens, would still be allowed, under those laws. Changing laws to include EU Citizens in the list of persons not to be spied upon would be a confidence building measure... but we all know that the US won't stop snooping in Europe. There are way too many juicy trade secrets there to steal, so a no-spy rule w.r.t. Europe won't make it through Congress.

about 5 months ago
top

Airline Pilots Rely Too Much On Automation, Says Safety Panel

cpghost Children of the Magenta (270 comments)

You may want to watch this very on-topic keynote.

about 5 months ago
top

Time For a Warrant Canary Metatag?

cpghost It needs to be subtle... (332 comments)

... and not some metatag whose absence or presence the authorities will detect.

The question is: can it be done with cryptographic means? If you distributed your site to a select audience of subscribers by encrypting it with their public keys, there's a special canary distribution algorithm on top of this architecture that can't be detected by outsiders (outsiders as in: someone who doesn't have access to at least one private key of the subscribers). That algorithm is hardened by switching to a P2P infrastructure where an outsider is one that doesn't at least have N-M (M greater than 0, sometimes even down to 1!) private subscriber keys.

about 5 months ago
top

Skydiving Accident Leaves Security Guru Cedric 'Sid' Blancher Dead At 37

cpghost Re:Accident? (332 comments)

On first thought, yes that's paranoid. On second thought... not so much anymore. The only question is: how could the NSA have done it? With remote SIGINT? Or do they muddle with HUMINT nowadays?

about 5 months ago
top

Ten Steps You Can Take Against Internet Surveillance

cpghost Re:There is only one way (234 comments)

No, not using the network makes you even more suspicious. In fact, it makes you a prime suspect nowadays! Use the network in a "harmless" way, i.e. in a way that doesn't give away information about you. Be as invisible as possible, by blending in with the sheep. Just don't draw attention to you, even if you're not a person of interest.

about 6 months ago

Submissions

cpghost hasn't submitted any stories.

Journals

cpghost has no journal entries.

Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Sign up for Slashdot Newsletters
Create a Slashdot Account

Loading...