Berkeley CSUA MOTD:Entry 22438
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/07/09 [General] UID:1000 Activity:popular
7/9     

2001/9/13-14 [Computer/SW/Security] UID:22438 Activity:nil
9/13    Well, the anti-crypto people are at it again:
        http://www.wired.com/news/politics/0,1283,46816,00.html
        \_ "They that can give up essential liberty to obtain a little temporary
           safety deserve neither liberty nor safety." -- Benjamin Franklin:
           Motto of the Historical Review of Pennsylvania, 1759
2025/07/09 [General] UID:1000 Activity:popular
7/9     

You may also be interested in these entries...
2012/8/26-11/7 [Computer/SW/Security] UID:54465 Activity:nil
8/26    Poll: how many of you pub/priv key users: 1) use private keys that
        are not password protected 2) password protect your private keys
        but don't use ssh-agent 3) use ssh-agent:
        1) .
        2) ..
        3) ...
	...
2012/8/7-10/17 [Computer/SW/Security] UID:54455 Activity:nil
8/6     Amazon and Apple have lame security policies:
        http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all
        "First you call Amazon and tell them you are the account holder, and
         want to add a credit card number to the account. All you need is the
         name on the account, an associated e-mail address, and the billing
         address. "
	...
2012/7/18-8/19 [Health/Men, Computer/SW/Security] UID:54438 Activity:nil
7/18    "Largest penis record holder arouses security suspicions at airport"
        http://www.csua.org/u/x2f (in.news.yahoo.com)
        \_ I often have that same problem.
        \_ I think the headline writer had some fun with that one.
           \_ One time when I glanced over a Yahoo News headline "U.S. busts
              largest-ever identity theft ring" all I saw was "U.S. busts
	...
2012/5/8-6/4 [Computer/SW/Unix] UID:54383 Activity:nil
5/8     Hello everyone!  This is Josh Hawn, CSUA Tech VP for Spring 2012.
        About 2 weeks ago, someone brought to my attention that our script
        to periodically merge /etc/motd.public into /etc/motd wasn't
        running.  When I looked into it, the cron daemon was running, but
        there hadn't been any root activity in the log since April 7th.  I
        looked into it for a while, but got lost in other things I was
	...
2012/4/23-6/1 [Computer/SW/WWW/Browsers] UID:54360 Activity:nil
4/19    My Firefox 3.6.28 pops up a Software Update box that reads "Your
        version of Firefox will soon be vulnerable to online attacks."  Are
        they planning to turn off some security feature in my version of
        Firefox?
        \_ Not as such, no, but they're no longer developing this version,
           so if a 3.6.x-targeted hack shows up, you're not going to get
	...
Cache (2725 bytes)
www.wired.com/news/politics/0,1283,46816,00.html
Muslims * Hide Out Under a 28 Security Blanket * Today's Top 5 Stories * 29 Playing With Sounds in Your Head * 30 Makeovers Dot-Com: Check It Out * 31 California Bans E-Vote Machines * 32 NZ Volcano Scarier Than Mt. Servicemen in Iraq * 36 Western Firm Pulls Staff from Yanbu; Cautions * 37 Gunmen Kill Settler, Four Daughters Amid Gaza Vote * 38 American Trucker Free After 3 Weeks as Iraq Hostage * 39 Son of Ex-Dictator Seen Winning Panama Election * 40 More Breaking News * 41 Wire Service Photo Gallery Tech Jobs Partner 42 Today's the Day. Tuesday's catastrophe, which shed more blood on American soil than any event since the Civil War, appears to have started that process. Judd Gregg (R-New Hampshire) called for a global prohibition on encryption products without backdoors for government surveillance. Gregg said encryption makers "have as much at risk as we have at risk as a nation, and they should understand that as a matter of citizenship, they have an obligation" to include decryption methods for government agents. Gregg's speech comes at a time when privacy and national security, long at odds, had reached an uneasy detente. In response to business pressure and the reality of encryption embedded into everything from Linux to new Internet protocols, the Clinton administration dramatically relaxed -- but did not remove -- regulations intended to limit its use and dissemination. Janet Reno, Clinton's attorney general, said in September 1999 that the new regulations struck a reasonable balance between privacy and security. The four hijacked airplanes and the disasters they created have abruptly returned the debate on Capitol Hill to where it was years ago, when FBI Director Louis Freeh spent much of his time telling anyone who would listen that terrorists were using encryption -- and Congress should approve restrictions on domestic use. Another Clinton administration initiative was the 50 Clipper Chip, a cryptographic device that included both a data-scrambling algorithm and a method for certain goverment officials to decode intercepted, Clipper-encoded communications. After a public outcry, the federal government eventually abandoned its plans to try to convince American businesses to build Clipper-enabled products. But some of encryption's brightest lights are already worrying about the effect of Draconian new laws and regulations. End of story Send e-mail icon Have a comment on this article? Your use of this website constitutes acceptance of the Lycos 78 Privacy Policy and 79 Terms & Conditions Note: You are reading this message either because you can not see our css files (served from Akamai for performance reasons), or because you do not have a standards-compliant browser.