Berkeley CSUA MOTD:Entry 24485
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2024/11/23 [General] UID:1000 Activity:popular
11/23   

2002/4/18 [Science/GlobalWarming] UID:24485 Activity:nil
4/18    secure data vault vs carnivore?  Does this make any real world sense?
        http://www.wired.com/news/privacy/0,1848,51917,00.html
2024/11/23 [General] UID:1000 Activity:popular
11/23   

You may also be interested in these entries...
2013/5/7-18 [Science/Physics] UID:54674 Activity:nil
5/7     http://www.technologyreview.com/view/514581/government-lab-reveals-quantum-internet-operated-continuously-for-over-two-years
        This is totally awesome.
        "equips each node in the network with quantum transmitters–i.e.,
        lasers–but not with photon detectors which are expensive and bulky"
        \_ The next phase of the project should be stress-testing with real-
           world confidential data by NAMBLA.
	...
2012/12/4-18 [Science/GlobalWarming] UID:54545 Activity:nil
12/4    "Carbon pollution up to 2 million pounds a second"
        http://www.csua.org/u/yk6 (news.yahoo.com)
        Yes, that's *a second*.
        \_ yawn.
        \_ (12/14) "AP-GfK Poll: Science doubters say world is warming"
        \_ (12/14)
	...
Cache (2256 bytes)
www.wired.com/news/privacy/0,1848,51917,00.html
By 19 Declan McCullagh | 20 Also by this reporter Page 1 of 1 02:00 AM Apr. Servicemen in Iraq * 37 Western Firm Pulls Staff from Yanbu; Demands * 41 More Breaking News * 42 Wire Service Photo Gallery Tech Jobs Partner 43 Today's the Day. Iliev's system relies on technology, not Congress or federal judges, to keep 45 Carnivore on a very short leash. Much of the public outcry over Carnivore and similar eavesdropping methods arises because they take a vacuum-cleaner approach, sucking in all the data flowing through a network and then storing only the desired information. But if the snooperware is buggy or if police agencies go beyond what a court order allows, the system will snare far more traffic than it is authorized to retain. The data would be encrypted, with the only key able to unlock the information kept by the vault. An FBI agent who wanted to access the information would obtain a search order that was digitally signed by a judge. The vault would recognize that signature and divulge only the information specified by the court. There would be no chance -- assuming the vault was programmed properly -- for a fishing expedition. Even if the FBI physically seized the vault, legally or otherwise, it's supposed to be just about impossible for the cops to crack. Iliev's program runs on an IBM 4758 48 cryptographic coprocessor, designed to destroy itself if it detects an intrusion attempt. Iliev says he isn't necessarily suggesting that administrators store terabytes of traffic -- after all, the best way to protect someone's privacy is never to have their information on file in the first place. Rather, Iliev says, if an administrator is required to play Big Brother, he wants them to have a reasonable way to do it. Other applications for the vault, beyond storing network data, include encrypting medical or financial information that would be released only to authorized users. End of story Send e-mail icon Have a comment on this article? Your use of this website constitutes acceptance of the Lycos 78 Privacy Policy and 79 Terms & Conditions Note: You are reading this message either because you can not see our css files (served from Akamai for performance reasons), or because you do not have a standards-compliant browser.