people) E-mail correct
over a poor-quality phone connection is hard enough already!
ciao,
--
-- Jonathan Thornburg [remove -animal to reply]
jth...@astro.indiana-zebra.edu
Dept of Astronomy IUCSS, Indiana University, Bloomington, Indiana, USA
There was of course no way of knowing whether you
attempted decryption. But Room 40 still broke it.
A rereading of Kahn The Codebreakers on the era of Nomenclatures and
beyond does not offer high hopes of this diary-code staying unbroken if
the NSA decides it's worth a few analyst-months and GPU-centuries...
ciao,
--
-- Jonathan Thornburg [remove
worth spending any money trying to
secure nuclear reactors against tsunami damage.
--
-- Jonathan Thornburg [remove -animal to reply]
jth...@astro.indiana-zebra.edu
Dept of Astronomy IUCSS, Indiana University, Bloomington, Indiana, USA
There was of course no way of knowing whether you were
,
--
-- Jonathan Thornburg [remove -animal to reply]
jth...@astro.indiana-zebra.edu
Dept of Astronomy IUCSS, Indiana University, Bloomington, Indiana, USA
There was of course no way of knowing whether you were being watched
at any given moment. How often, or on what system, the Thought Police
logins to online service occur at a place
and time where the user doesn't have cellphone reception? Have there
been any (well-done) surveys to estimate this?
ciao,
--
-- Jonathan Thornburg [remove -animal to reply]
jth...@astro.indiana-zebra.edu
Dept of Astronomy IUCSS, Indiana University
somewhere?
ciao,
--
-- Jonathan Thornburg [remove -animal to reply]
jth...@astro.indiana-zebra.edu
Dept of Astronomy IUCSS, Indiana University, Bloomington, Indiana, USA
There was of course no way of knowing whether you were being watched
at any given moment. How often, or on what system
in secure facilities anyway.
takes a digital-camera
--
-- Jonathan Thornburg [remove -animal to reply]
jth...@astro.indiana-zebra.edu
Dept of Astronomy IUCSS, Indiana University, Bloomington, Indiana, USA
on sabbatical in Canada through late August 2013
There was of course no way
, then Skype
is about as (in)secure as a phone conversation, and Skype IMs are about
as (in)secure as cellphone SMSs.
--
-- Jonathan Thornburg [remove -animal to reply]
jth...@astro.indiana-zebra.edu
Dept of Astronomy IUCSS, Indiana University, Bloomington, Indiana, USA
on sabbatical in Canada
,
--
-- Jonathan Thornburg [remove -animal to reply]
jth...@astro.indiana-zebra.edu
Dept of Astronomy IUCSS, Indiana University, Bloomington, Indiana, USA
on sabbatical in Canada starting August 2012
Washing one's hands of the conflict between the powerful and the
powerless means to side
gets me an error screen
Sorry, you have to enable Javascript in order to use this.
I think there's a message here.
--
-- Jonathan Thornburg [remove -animal to reply]
jth...@astro.indiana-zebra.edu
Dept of Astronomy IUCSS, Indiana University, Bloomington, Indiana, USA
The digit sequence
0.1234567891011121314151617181920212223...
(or its equivalent in binary, hex, or your other favorite base)
never repeats, but provides no security whatsoever. One-time pads
need nonrepeating sequences *which the adversary can't predict*.
--
-- Jonathan Thornburg [remove
of PC where web browser remembered it, etc.
So... it would be a *big* plus to have a way to rollover the master
password without having to manually re-visit and re-password each
website.
--
-- Jonathan Thornburg [remove -animal to reply]
jth...@astro.indiana-zebra.edu
Dept of Astronomy IUCSS
/software which *does* grok the letters (e.g., she buys a new
smartphone in Germany, which *does* have o-umlaut on its virtual|physical
keyboard)?
ciao,
--
-- Jonathan Thornburg [remove -animal to reply]
jth...@astro.indiana-zebra.edu
Dept of Astronomy IUCSS, Indiana University, Bloomington, Indiana
?
Maybe they only plan to brute-force human-provided passphrases used
to generate AES keys?
--
-- Jonathan Thornburg [remove -animal to reply]
jth...@astro.indiana-zebra.edu
Dept of Astronomy IUCSS, Indiana University, Bloomington, Indiana, USA
Washing one's hands of the conflict between
will be idle
when their owners are sleeping, and usually when owners are out
at school/work/shopping/etc in the daytime), the botnet throughput
is only modestly degraded.
--
-- Jonathan Thornburg [remove -animal to reply]
jth...@astro.indiana-zebra.edu
Dept of Astronomy IUCSS, Indiana
.
--
-- Jonathan Thornburg [remove -animal to reply]
jth...@astro.indiana-zebra.edu
Dept of Astronomy IUCSS, Indiana University, Bloomington, Indiana, USA
Washing one's hands of the conflict between the powerful and the
powerless means to side with the powerful, not to be neutral
, [[...]]
According to
http://www.nytimes.com/2010/04/26/technology/26captcha.html?hpw
the going rate for paying humans to break CAPTCHAs is around $1 per
1000 CAPTCHAS, i.e., around 0.1 cent per CAPTCHA.
--
-- Jonathan Thornburg [remove -animal to reply]
jth...@astro.indiana-zebra.edu
Dept
some
piece of software which knows Alice's private key, and some bit-string
(a document). But the legal system wants a binding to Alice's conscious
intent, which is a *very* different thing.
--
-- Jonathan Thornburg [remove -animal to reply]
jth...@astro.indiana-zebra.edu
Dept of Astronomy
this for certificates, but I forget its name...
ciao,
--
-- Jonathan Thornburg [remove -animal to reply]
jth...@astro.indiana-zebra.edu
Dept of Astronomy IUCSS, Indiana University, Bloomington, Indiana, USA
Washing one's hands of the conflict between the powerful and the
powerless means to side
, but there is at least
one jailbreak where the crypto was directly broken: the TI-83 series
of graphing calculators. The jailbreakers used a distributed factoring
project to factor the 512-bit RSA keys burnt into the calculators' ROMs.
(I think this counts as breaking the crypto.)
--
-- Jonathan Thornburg [remove
20 matches
Mail list logo