anologwintermut | 8 years ago | on: Pistol sights
anologwintermut's comments
anologwintermut | 10 years ago | on: Secret Code Found in Juniper's Firewalls Shows Risk of Government Backdoors
Looks like they feed the output through a standard CPRNG. Assuming it's true, that pretty much breaks the DUAL_EC attack because you can't use the output of the final CPRNG to recover the DUAL_EC state.
anologwintermut | 10 years ago | on: What Does the OS X Activity Monitor’s “Energy Impact” Actually Measure?
anologwintermut | 10 years ago | on: Google’s Project Vault Is a Computing Environment on a Micro SD Card
anologwintermut | 11 years ago | on: Tesla Plans to Open Car Doors to All Hackers This Summer
Cool trick in that one, the Prover(i.e. the key fob) does the distance measuring part of the challenge response protocol using analog only components. This means its response time is <1 nano second.
So you can do it with only the car having a good timer.
anologwintermut | 11 years ago | on: Tesla Plans to Open Car Doors to All Hackers This Summer
anologwintermut | 11 years ago | on: ZeroDB, an end-to-end encrypted database
anologwintermut | 11 years ago | on: ZeroDB, an end-to-end encrypted database
anologwintermut | 11 years ago | on: Why Does the Putnam Math Competition Give a Separate Prize to Women?
anologwintermut | 11 years ago | on: Why Does the Putnam Math Competition Give a Separate Prize to Women?
So, unless one seriously thinks that the entire field of programming/IT/computer science as a whole requires that level of talent, Summer's point doesn't apply and there are certainly other reasons for the gender gap in computer science.
anologwintermut | 11 years ago | on: The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle
Lets suppose it actually was a valid defense. But what does that have to do with going through the Facebook and personal email of individual employees to know who to target. That was done up close, in personal, by hand. By any definition, those people had their privacy specifically and intentionally violated by actual human analysts.
anologwintermut | 11 years ago | on: The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle
anologwintermut | 11 years ago | on: The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle
But the means of doing so is truly questionable, even given all their assertions about trust us and we don't look at everyones stuff.
anologwintermut | 11 years ago | on: The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle
That's different than collecting everyone'ss data and claiming you never look at it unless someone does something to loose their innocence. Orwellian nightmare that that is and probably bullshit, revelations along those lines are not surprising. The systematic targeting of the personal lives of random employees (at least of non-governmental/ non defense industry ones), is new.
anologwintermut | 11 years ago | on: The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle
The absolute lowest bar for surveillance seems to be that a government doesn't use it to intentionally target innocent people/ those not in the game (hell, lets lower it even further to be only people the government themselves believe are innocent).[0]
That potentially allows dragnet collection of data if no one looks at it. It might allow hacking just a company's servers to get access to third party data. It probably allows you to spy on foreign heads of state (even if it's a boneheaded move). But it damn well doesn't allow you to go through the personal communications of people who you know have done nothing wrong and aren't even working for someone who has.
[0] This is precisely the woefully low bar Obama has been espousing : “The bottom line is that people around the world, regardless of their nationality, should know that the United States is not spying on ordinary people who don’t threaten our national security and that we take their privacy concerns into account in our policies and procedures,”
anologwintermut | 11 years ago | on: “RNG broken for last 4 months”
anologwintermut | 11 years ago | on: “Equation Group” ran the most advanced hacking operation ever uncovered
Arms control limitations (SALT,START), the hague convention, etc, work because there are means of verifying countries adhere to what they agree on (and ostensibly punishing those who don't).
Given the difficulty of attributing cyber attacks (e.g. Sony), much less cyber espionage, there's little reason to think this is possible in this case. And that's just for direct action.
If we're talking about tactics and capabilities, it's impossible. How are you going to make sure there aren't 30 people somewhere writing malware for a government? You can't, at least absent far more invasive spying or some kind of DRM that makes writing malware illegal.
anologwintermut | 11 years ago | on: Designing Crypto Primitives Secure Against Rubber Hose Attacks
The device you're authenticating must have the secret you're authenticating with in it in a retrievable format. So it can't be used for e.g. disk encryption, etc, because the attacker can just get the secret from the device and decrypt.
All it can be used for is authentication, and for that they require a human security guard to ensure it's actually a human playing the authentication game. If you were to attach a computer, its likely it could impersonate you. So almost completely useless (except for getting people's hopes up).
More discussion here : https://news.ycombinator.com/item?id=4266115
anologwintermut | 11 years ago | on: How to write a PhD thesis your committee will not approve
anologwintermut | 11 years ago | on: What women in technology really think (150 of them at least)
But there is a point you are leaving out that comes up if you talk to anyone who does treat firearms seriously: many people do not take those classes and/or do not treat guns safely. Go to a range on Sunday and that will be really clear. Or read the comment history by people who bring this up whenever guns come up in a general forum. Often they rightly end up complaining about safety of other gun owners in posts in more topic specific forums. But somehow, when it comes to a general audience, those issues get omitted.
Taking the class would give you a distinctly wrong impression about the responsibility of all gun owners. As does the suggestion to take the class.
Sorry, not to single you out specifically, it really is a good suggestion. But the net rhetorical effect of people making points like this is (and I think it's intentional) to skew the framing of the issue. Yes, you may be responsible, but with the exception of some people who would never heed your advice, people who want more regulation of firearms aren't worried about you. Guns don't kill people, some people with guns kill people.