Berkeley CSUA MOTD:Entry 20765
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/07/08 [General] UID:1000 Activity:popular
7/8     

2001/3/13-14 [Computer/SW/Security] UID:20765 Activity:low
3/12    Need a secure way to encrypt files?  Try Pig Latin!
        (and you thought all those Pig Latin routines you learn in 61A would
        goto waste)
        http://www.cnn.com/2001/TECH/internet/03/12/napster.02/index.html
        \_ Uh huh....
        \_ Okay, so it is illegal to systematically un-Pig-Latinify the file
           names.  But what excuse does Napster have to not simple
           Pig-Latinify the list of song names that it's supposed to block,
           and match the new list with the file names?  There's no law
           saying you can't compare encrypted info with encrypted info, right?
2025/07/08 [General] UID:1000 Activity:popular
7/8     

You may also be interested in these entries...
2012/8/26-11/7 [Computer/SW/Security] UID:54465 Activity:nil
8/26    Poll: how many of you pub/priv key users: 1) use private keys that
        are not password protected 2) password protect your private keys
        but don't use ssh-agent 3) use ssh-agent:
        1) .
        2) ..
        3) ...
	...
2012/7/13-8/19 [Computer/SW/Security, Computer/Companies/Yahoo] UID:54436 Activity:nil
7/13    Why would Yahoo store passwords unencrypted?  I recall that even 20+
        years ago the passwords stored in /etc/passwd on instructional
        machines here at Cal were one-way encrypted.  (I think those were
        Ultrix machines.)
        \_ Doesn't this say anything already?
           http://finance.yahoo.com/echarts?s=YHOO+Interactive#symbol=yhoo;range=5y
	...
2010/3/9-30 [Computer/HW/CPU, Computer/SW] UID:53748 Activity:nil
3/9     http://www.engadget.com/2010/03/09/1024-bit-rsa-encryption-cracked-by-carefully-starving-cpu-of-ele
        I failed to see why you must starve the CPU of electricity. Why
        can't you just simulate that in software?
        \_ And if you can simulate that in software, why not just single-
           stepping the simulated CPU and get the key out?
	...
2009/12/29-2010/1/19 [Computer/SW/Security] UID:53607 Activity:nil
12/29   Sounds like the GSM encryption key has been recovered via a
        brute force attack:
        http://www.nytimes.com/2009/12/29/technology/29hack.html
	...
2008/12/2-6 [Computer/SW/Apps, Academia/Berkeley/CSUA/Motd] UID:52140 Activity:kinda low
12/1    Just curious -- what do you guys generally use soda for? Why do you
        log on? Personally, I use it to keep a presence on IRC and AIM/gTalk
        at all times, and mess around with some Python programming (been
        setting up Twisted and such so I can play with making an irc bot).
        --toulouse
        \_ I use it to post SHIT, er, I mean, spill my guts about the company
	...
2008/11/11-26 [Computer/SW/Mail] UID:51911 Activity:nil
11/11   My RAID box has an email alert setting that requires an SMTP
        server. Are there non-encrypted smtp servers I can use?
        \_ yes
	...
2008/8/5-10 [Computer/HW/Laptop] UID:50783 Activity:nil
8/5     Laptop with names of 33K people in the 'Clear' program stolen.  Data
        was (of course) unencrypted.
        http://www.schneier.com/blog/archives/2008/08/laptop_with_tru.html
        \_ http://news.yahoo.com/s/nm/20080805/bs_nm/tjx_theft_charges_dc
           When are people going to learn to encrypt sensitive data?
           \_ When encryption becomes transparent enough that noone has
	...
2008/8/5-10 [Computer/HW/Laptop] UID:50787 Activity:nil
8/5     how is power usage on my laptop if i encrypt everything
        http://www.schneier.com/blog/archives/2008/08/laptop_with_tru.html
        \_ Steve Gibson's analysis on performance was that Trucrypt on a WinXP
           laptop was actually faster, but I don't know about battery.
           laptop was actually faster, but I don't know about battery life.
           \_faster?  How can that be?  Also, I don't see that in the article.
	...
2008/7/20-23 [Computer/HW/Laptop, Computer/SW/Security] UID:50640 Activity:nil
7/20    Does my encrypted disk LVM everything partition scheme make my
        laptop consume a lot more power than if I weren't using encrypted
        LVM?
	...
Cache (1927 bytes)
www.cnn.com/2001/TECH/internet/03/12/napster.02/index.html
Canada firm uses pig Latin to fool Napster block image In this story: 35 Mirrors Aimster function 36 Song list sent 37 RELATED STORIES, SITES icon 38 TORONTO, Ontario -- A Canadian company has introduced software intended to help millions of frustrated Napster users to continue downloading free music. PulseNewMedia, a company affiliated with the University of Toronto, is using pig Latin to disguise Napster file names that are to be blocked this week. Chillcott acknowledged that the new software gives the company some advertising word-of-mouth and heightens its profile. The band Metallica, for instance, would become ettalicam. Napster, which has about 60 million users worldwide, has already begun filtering song titles in order to block access. Under a court injunction issued on March 5, Napster is required to bar the transfer of songs specified within three days of notification by the copyright holders. He added that they are prepared to handle a high volume of downloads. He said the software is legal since it only renames the existing files. Aimster Chief Executive Officer Johnny Deep said last week that changing file names with encryption makes it illegal to systematically remove the altered files. Deep said Napster might be able to remove encrypted file names one by one, but it couldn't "reverse engineer" the NapCameBack Encoder to remove all songs that had been encrypted -- even though the encryption is so simple that anyone can deduce the real title of an encrypted file name. The Digital Millennium Copyright Act outlaws the reverse engineering of encryption schemes, Deep said. Under a court injunction issued March 5, Napster is required to bar the transfer of songs specified within three days of notification by the copyright holders. Napster has tried to block the transfer of 500 to 1,000 song titles over the past week, but in some cases users managed to get around the screening mechanisms.