Re: Make Work Project For ESA
Say this to me in real life and see what happens.
16005 publicly visible posts • joined 3 Jun 2008
And not just Facebook, it’s the way Silicon Valley companies like yours pile up huge wealth by destroying value in every other part of the economy, as if technological progress were a zero sum game. It’s the way you strip-mine individuals so they have no ability to be autonomous economic agents, owning and trading the stuff we make, so all we have to live on is some feudal digital plantation
Someone took his Marxist Socialist Classes pretty early.
How about a visit at the Mises Institute next time?
> Republican/Libertarian
Using these two in the same sentence outs you as clueless.
Libertarians would rightfully flush patents down the toilet. Except Randians, but these are really not libertarians. A libertarian would deny to have a need for a "head schoolmaster" to manage "intellectual property".
As for Rebups. Well.... they support Raython. Enough.
It sounds more like a "business patent": "Here is a generic idea that allows other people to read your pretend-encrypted stuff without your knowledge or aquiesence: hand over part of your key to a general, hackable registry held by a trusty government." Ha Ha. Now hand over the money.
It is useful to remember that encryption c.a. 1997 in Amurrikka was about the "Clipper Chip" (government listening in to you encrypted phone conversation). I would hazard a guess that the patent comes from there
(Other themes of interest back then where: "illegal pornography on the Interwebs", Timmy McVeigh, the Louis Freeh FBI - Louis being a nasty piece of work - and disgusting excesses by Democreeps and Rethuglians alike. All of that seems frankly tame nowadays.)
Are there any systems that can be used with an insecure host that only expose a risk of the ONE password being leaked?
That does not sound feasible even theoretically. Unless you can select a given record in your vault online, which already sounds bad in many ways, or you have separate 2FA for every password. But then you can carry them in your mobile (which you won't connect to the insecure machine, of course)
But if using a dedicated vault for that one password fulfills your requirements, you may want to go that way.
Dick Cheney, Lord of Darkness, is waiting at the bottom, biding his time and cackling furiously.
Also: Politician: “I Prevented The CERN LHC From Destroying Mankind”
An ex-Labour politician, Simon Parkes, has claimed “psychopathic” world leaders, known as the “illuminati”, were planning on using CERN’s Large Hadron Collider (LHC) to open up a vortex allowing them to take control over the human population.
(I don't know how the above site looks w/o NoScript, so beware)
Meanwhile, on a nearby Star Destroyer:
"Yes Sir, we have captured this peculiar emission as the interloper jumped back into Hyperspace. Analysis reveals that the message has no inherent meaning. We are probably in presence of a Mark II Base Artificial Intelligence going stark raving bonkers due to extensive decay of the interwave positronic connections. Yes Sir. We recommend to disregard this particular bogey."
This is Italy so it's probably a fat kickback for a preferred pork program (PPP), nothing to do with reality.
The Independent seems to take this at face value ... but then again the WaPo today thinks that Europe has a particular terrorist problem because there is no pervasive surveillance, integrated data exchange and not enough cops. Seems more like because Europe is near to american battlefields and likes to involve itself in the same for unclear reasons.
MD5, a particularly weak hashing algorithm
Not really. Yes, you can construct a collision but in this case you are forced to use printable ASCII of limited length to find a text that hashes to the same unknown password. That does not sound practical. Worse is the absence of salt, which leads to a nice rainbow table attack possibility.
> A good defender needs experience attacking.
Not really. He needs experience in thinking things through (a mathematical mind can help a lot), minimizing what is confusingly called "attack surface" and needs to have an array of goodies at his disposal to perform defense-in-depth (as well as the minions to implement said defense and man the seats; generally forgotten, after all, if the CEO can install PowerDVD in 15 minutes, how hard it can it be for the lone IT guy to secure the network? Did I mention the balls to implement a security policy?).
An attacker needs to think messily (a mathematical mind may well be a hindrance) and can feel around the edges and edge cases. If there is no risk getting caught (state actors etc.), he can try to pry a bit harder. If there are several attackers working in concert, interference can be run (an "Israeli art student" attack, eh?), parallel attacks can be had and the time of attack can be compressed, all of which is very useful.
Ex-CIA director James Woolsey wants to see him hanged for enabling terrorists
From bottom-feeding screechwriters to zero-ethics psychos nominally "in charge" to "progressive neocons" angling for the presidency ... getting rid of these people (and by this I mean, a one-way trip to the Fletcher Memorial Home) is becoming a requirement to survival fast.
"Pent-up demand" makes no sense unless someone is applying a blocade. Same as "pent-up voltage". There either is demand or there isn't and both situations will influence pricing and goods actually offered. Seeing how tables are not flying off shelves, the pent-uppery is low indeed.
"Shall I say that the voice was deep; hollow; gelatinous; remote; unearthly; inhuman; disembodied? What shall I say? It was the end of my experience, and is the end of my story. I heard it, and knew no more. Heard it as I sat petrified in that unknown cemetery in the hollow, amidst the crumbling stones and the falling tombs, the rank vegetation and the miasmal vapours. Heard it well up from the innermost depths of that damnable open sepulchre as I watched amorphous, necrophagous shadows dance beneath an accursed waning moon. And this is what it said:
“YOU FOOL, YOU ARE NOW DISCONNECTED!”
See "The Cuckoo's Egg"/"Stalking the Wily Hacker" for more on this.