Berkeley CSUA MOTD:Entry 31494
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/05/24 [General] UID:1000 Activity:popular
5/24    

1994/2/22 [Computer/SW/Security] UID:31494 Activity:nil
2/21    Read ~boss/Clipper for info on the clipper chip, and for a chance
        to add your name to a petition against it.
         \_ The issue of whether the government has a legal right to
            monitor communications (with the proper search warrant)
            is clouded and ignored by bandying about terms like
            "big brother" and "facist." It's ludicrous to think that
            the government will monitor *more* communications if
            Clipper passes.
                   \_ It's not ludicrous at all. Monitoring resources are
                      costly. If Clipper is easier -- cheaper -- to monitor
                      than alternative technologies, than the government
                      can listen in more than they would otherwise. Even
                      totalitarians are subject to economics...
            \_ Encryption now: none.
        Ease of tapping: easy.
        Encryption with Clipper: some.
        Ease of tapping: Less.
        This isn't brain surgery.  The government isn't asking
        for anything it doesn't already have.  Deal with the
        real issues instead of fear-mongering.
          \_ In addition, clipper will fool people into thinking
             they're safe when they aren't...so communications
             that were thought too important to trust to the net
             before will become open to the government.
             \_ Not without a search warrant.
                           \_ No, Clipper will fool *stupid* people into
                              thinking they're safe.  There's a difference.
         \_ It could be argues that Clipper provides increased privacy
            since it gives cell phone makers, etc. free encryption
            with no r&d costs.  I'd prefer knowing the line was secure
            from everyone buty the cops than open to anyone who knows
          what frequency to listen in on...
         \_ You're assuming that this wonderful algorithm that the
            NSA came up with is a good one.  Since it's so secret,
            it could be total bullshit for all anyone knows...although
            far be it for me to imply that the government is somehow
            able to make mistakes...
          \_ With the incredibly quick advances
           in technology, nothing is secure for more than
           a decade or two.
2025/05/24 [General] UID:1000 Activity:popular
5/24    

You may also be interested in these entries...
2010/3/9-30 [Computer/HW/CPU, Computer/SW] UID:53748 Activity:nil
3/9     http://www.engadget.com/2010/03/09/1024-bit-rsa-encryption-cracked-by-carefully-starving-cpu-of-ele
        I failed to see why you must starve the CPU of electricity. Why
        can't you just simulate that in software?
        \_ And if you can simulate that in software, why not just single-
           stepping the simulated CPU and get the key out?
	...
2009/12/29-2010/1/19 [Computer/SW/Security] UID:53607 Activity:nil
12/29   Sounds like the GSM encryption key has been recovered via a
        brute force attack:
        http://www.nytimes.com/2009/12/29/technology/29hack.html
	...
2008/8/5-10 [Computer/HW/Laptop] UID:50783 Activity:nil
8/5     Laptop with names of 33K people in the 'Clear' program stolen.  Data
        was (of course) unencrypted.
        http://www.schneier.com/blog/archives/2008/08/laptop_with_tru.html
        \_ http://news.yahoo.com/s/nm/20080805/bs_nm/tjx_theft_charges_dc
           When are people going to learn to encrypt sensitive data?
           \_ When encryption becomes transparent enough that noone has
	...
2008/6/25-7/14 [Computer/SW/Security] UID:50380 Activity:nil
6/25    some XCF or CSUA person had a web page about a project they were
        working on where I set up a machine, and you set up a machine
        somewhere, and they both passively back each other, i believe with
        an encryption key so i can't read your backups.  when your disk
        catches on fire, i just give you a copy of your data.  anyone remember
        the name of this?
	...
2008/6/9-12 [Computer/SW/Languages/C_Cplusplus, Computer/SW/Security] UID:50194 Activity:nil
6/8     CSUA code guru please help. I need to see my random number
        generator with a good seed (I just need random 18 bit
        identifiers). The usual time(NULL) is OK, except my program
        might be invoked faster than once a second, and seeding using
        time() produced the same result. I tried clock() but it seems
        to return 0. My program needs to be run in Linux/DOS (Watcom
	...
2008/4/21-5/2 [Computer/SW/Security] UID:49787 Activity:nil
4/21    Yahoo Instant Messenger is not encrypted. Are there chat programs
        that are a bit more secure than YIM?
        \_ what OS are you using?
        \_ What are your goals? Corporate security, or preventing your wife
           from eavesdropping on you? If you're using IM for internal company
           communication, you shouldn't be using anything where you don't
	...
2008/2/21-25 [Computer/HW/Memory, Computer/SW/Security] UID:49208 Activity:nil
2/21    Cold Boot Attacks Against Disk Encryption:
        http://www.schneier.com/blog/archives/2008/02/cold_boot_attac.html
        http://citp.princeton.edu/memory
	...
2006/10/27-30 [Computer/SW/Security] UID:45013 Activity:low
10/27   Anybody tried the "PDF decryptor" or "PDF password delete" type of
        software?  I have a PDF form file that won't let me save.  I'm
        considering getting one of those type of software to unlock the
        file.  I really don't want to pay to try it out though.  Are there
        free open source PDF unlock programs?  Thanks.
        \_ I've used Elcomsoft's (of "Free Dmitry Sklyarov!" fame) PDF
	...
2006/8/22-23 [Computer/SW/Security] UID:44096 Activity:high
8/22    In Windoze XP, how can I make my service start automatically when it
        boots up in Safe Mode?  I searched MSDN site and didn't see anything.
        Thanks.
        \_ I don't know how to do that in Windoze XP but it isn't that hard in
           Windows XP.
           \_ And that would be how?  Thx.
	...
2006/8/12-14 [Computer/SW/Security] UID:43984 Activity:nil
8/12    Anybody know of a good backup solution for PGP encrypted disks?
        The way I've been backing up is to make copies of the .pgd file
        with dates in the filename.  This method is not very scalable as my
        .pgd files are becoming gigabytes in size.  Anybody know
        of an integrated solution to backups and encrypted folders/disks?
        OS X Leopard "time machine" backup feature looks interesting.  But
	...