Follow Slashdot stories on Twitter


Forgot your password?
Trust the World's Fastest VPN with Your Internet Security & Freedom - A Lifetime Subscription of PureVPN at 88% off. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. ×

Comment Hate to rain on your parade (Score 1) 216

I fail to see how Bitcoin is private and confidential. All the transactions are public (inherently by design). And if you buy bitcoins somewhere with your CC or paypal or bank, it is possible to link the bitcoins to your name.

If you buy them with cash, you could as well buy one of those cash coupons that porn sites might accept too. Then, you gain TRUE anonymity and, as a bonus, you and the seller avoid the massive volatility of the currency (100x decrease/increase in value over a day).

Comment Ok (Score 4, Insightful) 80

Just, please, this time, try to be more careful about who joins your working groups. And especially what their true intentions are.

Sometimes when someone tries to "simplify deployment" or "offers insight to prevent user confusion", etc., you may want to think twice. History repeats itself, you know.

Comment Very informative piece of info at the bottom (Score 5, Informative) 246

A very interesting piece of info is at the bottom of TFA:

since readers were allowed to make comments without registering their names, the identity of the authors would have been extremely difficult to establish. Making Delfi legally responsible for the comments was therefore practical, said the court. It was also reasonable, because the news portal received commercial benefit from comments being made.

Comment Uninformed nonsense (Score 1, Flamebait) 169

The guy calls himself cryptographer, but he doesn't know what he's talking about.

Hashes, and also any ideal random oracles, have only (n/2) security due to so called birthday paradox limit.

That's why SHA-512 has only 256-bit security. This is not weakening of the hash in any form. It is a property of any hash or RNG.

What the slides show is that they want to reduce clutter in reducing dozen options into two options. One high-security (256-bit security) and another fast, medium-security.

Slashdot Top Deals

"Don't worry about people stealing your ideas. If your ideas are any good, you'll have to ram them down people's throats." -- Howard Aiken