Berkeley CSUA MOTD:Entry 44043
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/04/06 [General] UID:1000 Activity:popular
4/6     

2006/8/17 [Computer/SW/Security, Recreation/Humor] UID:44043 Activity:nil Cat_by:auto 80%like:44052
8/17    This is pretty funny:
        http://tinyurl.com/ku2mp  -John
2025/04/06 [General] UID:1000 Activity:popular
4/6     

You may also be interested in these entries...
2013/6/6-7/31 [Politics/Foreign/Asia/China, Computer/SW/Security] UID:54690 Activity:nil
6/6     Wow, NSA rocks. Who would have thought they had access to major
        data exchangers? I have much more respect for government workers,
        crypto experts, mathematicans now than ever.
        \_ flea to Hong Kong --> best dim-sum in the world
           \_ "flee"
        \_ The dumb ones work for DMV, the smart ones for the NSA. If you
	...
2012/8/26-11/7 [Computer/SW/Security] UID:54465 Activity:nil
8/26    Poll: how many of you pub/priv key users: 1) use private keys that
        are not password protected 2) password protect your private keys
        but don't use ssh-agent 3) use ssh-agent:
        1) .
        2) ..
        3) ...
	...
2012/8/7-10/17 [Computer/SW/Security] UID:54455 Activity:nil
8/6     Amazon and Apple have lame security policies:
        http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all
        "First you call Amazon and tell them you are the account holder, and
         want to add a credit card number to the account. All you need is the
         name on the account, an associated e-mail address, and the billing
         address. "
	...
2012/7/18-8/19 [Health/Men, Computer/SW/Security] UID:54438 Activity:nil
7/18    "Largest penis record holder arouses security suspicions at airport"
        http://www.csua.org/u/x2f (in.news.yahoo.com)
        \_ I often have that same problem.
        \_ I think the headline writer had some fun with that one.
           \_ One time when I glanced over a Yahoo News headline "U.S. busts
              largest-ever identity theft ring" all I saw was "U.S. busts
	...
2012/4/23-6/1 [Computer/SW/WWW/Browsers] UID:54360 Activity:nil
4/19    My Firefox 3.6.28 pops up a Software Update box that reads "Your
        version of Firefox will soon be vulnerable to online attacks."  Are
        they planning to turn off some security feature in my version of
        Firefox?
        \_ Not as such, no, but they're no longer developing this version,
           so if a 3.6.x-targeted hack shows up, you're not going to get
	...
2011/11/8-30 [Computer/SW/Security, Computer/SW/OS/Windows] UID:54218 Activity:nil
11/8    ObM$Sucks
        http://technet.microsoft.com/en-us/security/bulletin/ms11-083
        \_ How is this different from the hundreds of other M$ security
           vulnerabilities that people have been finding?
           \_ "The vulnerability could allow remote code execution if an
               attacker sends a continuous flow of specially crafted UDP
	...
2011/11/11-30 [Computer/SW/Security] UID:54224 Activity:nil
11/11   MacOSX's Sandbox security hole:
        http://preview.tinyurl.com/7ph2wtg [arstechnica]
	...
2013/2/18-3/26 [Recreation/Humor] UID:54609 Activity:nil
2/18    Too funny not to share:
        http://oscarzero.files.wordpress.com/2012/01/patch.jpg (funny youth patch)
	...
2012/12/6-18 [Recreation/Dating, Recreation/Media] UID:54549 Activity:nil
12/6    Lesson learned: don't talk about Monty Python on a date. Women just
        don't seem to get it.
        \_ You are dating the wrong women (for you) then. My sister-in-law
           loves it and yet I don't find it all that funny. It's not a
           gender thing.
           \_ is she a nerd? does she laugh funny? is she actually decent looking?
	...
Cache (8192 bytes)
tinyurl.com/ku2mp -> www.schneier.com/blog/archives/2006/08/bruce_schneier.html
August 16, 2006 12:33 PM I'll spoil the fun and post the full list: If Bruce Schneier wants your plaintext, he'll just squeeze it out of the ciphertext using his barehands Bruce Schneier got a perfect score on his comp-sci degree. Whitfield Diffie and Martin Hellman use only their surnames out of fear of Bruce Schneier Bruce Schneier can conduct secure multiparty computation... on his own Bruce Schneier mounts side-channel attacks through the front channel Bruce Schneier's discrete logarithms are uncountable and continuous Bruce Schneier always inhabits the soundness of error margin of your zero-knowledge crypto protocol When Bruce Schneier pre-computes S-box tables, he does it dynamically from the key... Bruce Schneier can determine the exact location and velocity of any particle that's being used by quantum cryptography. Quantum cryptography exchanged the Heisenberg Uncertainty Principle for the Schneier Dead Moral Certainty Principle when Bruce Schneier came to town. A mystery wrapped in an Enigma is no more puzzling to Bruce Schneier than a mystery wrapped in ROT-13. As Bruce Schneier says there is no Oscar for security theatre. Bruce Schneier's secure handshake is so strong, you won't be able to exchange keys with anyone else for days. Bruce Schneier uses an epic passpoem, detailing the life and works of seven mythical Norse heroes. Bruce Schneier's online purchases are so secure, his shopping cart is an M-1 tank. Bruce Schneier doesn't need steganography to hide data in innocent-looking files. Bruce Schneier can reverse any one-way cryptographic hash, just by staring it in the eye Bruce Schneier can solve NP-Complete problems in NlogN time. "When I wake up in the morning I piss cryptographic excellence." Bruce Schneier writes his books and essays by generating random alphanumeric text of an appropriate length and then decrypting it. If you use the digits of Pi to generate a visual image, it draws a picture of Bruce Schneier. The universe was created to serve as Bruce Schneier's crib text. Bruce Schneier's public and private keys are known as "Law" and "Order." When he was three, Bruce Schneier built an Enigma machine out of Legos. Bruce Schneier once found the inverse of a trapdoor function counting only on the fingers of one hand A vigenere cipher with the Key "BRUCESCHNEIER" is in fact unbreakable. Bruce Schneier fully discloses his own vulnerabilities: none. Bruce Schneier's Twofish algorithm has 16 rounds, but he always gets a knockout in the first. The nuclear launch codes held by the President of the United States are secured by an unbreakable system: a plain brown envelope with a picture of Bruce Schneier on the flap. Bruce Schneier was only allowed to view the Kryptos sculpture at Langley for 1 second, in order not to spoil the fun other cryptographers. Bruce Schneier doesn't have a chin under his beard -- just more ciphertext. If at first you don't succeed at breaking a cipher, you're not Bruce Schneier. In a fight between Ron Rivest and Adi Shamir, the winner would be Bruce Schneier. The output of Bruce Schneier's pseudorandom generator follows no describable pattern and cannot be compressed. There is only another pseudorandom number generator and he's gonna use it to encrypt your face. When Bruce Schneier does modulo arithmetic, there are no remainders. It has recently been discovered that every possible hashing algorithm produces the same value for the phrase "Bruce Schneier" -- Bruce Schneier. Bruce Schneier once broke AES using nothing but six feet of rusty barbed wire, a toothpick, and the front axle from a 1962 Ford Falcon. Every time Bruce Schneier smiles, an amateur cryptographer dies. Geologists recently discovered that "earthquakes" are nothing more than Bruce Schneier and Chuck Norris communicating via a roundhouse kick-based cryptosystem. Sweeping NSA reforms will soon require all employees to grow a Bruce Schneier beard. Bruce Schneier mounts chosen-ciphertext attacks without choosing the ciphertext As initialization vectors, 'Bruce Schneier' and 'Chuck Norris' are interchangeable. When Bruce Schneier uses double ROT13 encryption, the ciphertext is totally unbreakable. The final Beale Cipher, written 175 years ago, detailing the rightful owners of a cache of gold, has just two words in its plaintext: Bruce Schneier. Autographed copies of "Applied Cryptography" reguarly sell for twice the going rate for enigma machines on eBay Bruce Schneier sneers and solves Godel's incompleteness theorems. When Bruce Schneier clicks "Random Fact" the outcome is never random. Humboldt squids have sensors capable of detecting clothing worn by Bruce Schneier at 800 yards - to trigger their flight response. Beyond computational complexity, there is Schneiertational complexity Bruce Schneier can straighten out an elliptic curve with nothing but his teeth Bruce Schneier makes abstract algebra look like elementary algebra. August 16, 2006 01:02 PM my favorite is Humboldt squids have sensors capable of detecting clothing worn by Bruce Schneier at 800 yards - to trigger their flight response. August 16, 2006 01:06 PM I thought I had done a decent job with "Ed Hoculi Facts" (the ultra-muscular NFL referee). The best I can come up with is: "Beyond Fear is Bruce Schneier" I stand in awe of the accuracy with which these replicate the spirit of the "Chuck Norris Facts." August 16, 2006 01:10 PM My favorite: "Most people use passwords. Bruce Schneier uses an epic passpoem, detailing the life and works of seven mythical Norse heroes." August 16, 2006 01:24 PM My favorite so far: "Bruce Schneier writes his books and essays by generating random alphanumeric text of an appropriate length and then decrypting it." August 16, 2006 01:30 PM I liked the "facts" site, but it's a bit too attention starved fanboy for my taste. It does occur to me that these "facts" are more than a little too geeky to explain to my wife if I want to avoid extended celibacy. A couple of comments on the facts I saw in TFA: "Bruce Schneier writes his books and essays by generating random alphanumeric text of an appropriate length and then decrypting it". I suppose it could be done by calculating a one-time-pad against the random text to generate the article, but we all know how much he hates Crypto using one-time-pads, he might then have to put himself into his own doghouse. Bruce Schneier uses an epic passpoem, detailing the life and works of seven mythical Norse heroes." Even with variations for typesetting, the key-space is just way too limited and the likelihood of a typo in a pass-phrase that long is too high. I doubt that Bruce cares enough about his data security to implement a "strong" authentication solution. I would think he would implement a "reasonable, plus a bit more" solution. He would be the first to point out that having a uber secure, personally held cryptographic key signing token that's unlocked by a pass-number and biometric authentication is pretty pointless on a Windows Laptop connected to the Internet with a software firewall. Since there are so many easier ways to attack it than reversing the crypto its inefficient to increase the one thing that probably strong, better to try and secure it across the board. Such a token solution would just be security theatre and if we're doing theatre darn it, we should have music and dancing girls. August 16, 2006 01:33 PM "Bruce Schneier once broke AES using nothing but six feet of rusty barbed wire, a toothpick, and the front axle from a 1962 Ford Falcon." August 16, 2006 02:52 PM For the other Brits hanging out here: Am I the only one who kept on thinking of Jeremy Clarkeson's haiku-like comments about The Stig, on Top Gear, when reading the Schneierfacts page? Once I'd got over my shock at the idea of Clarkeson and co reviewing crypto, it was almost as funny as some of the Schneierfacts. August 16, 2006 03:02 PM It is a well-known fact among securty folk that there is no such thing as a DDoS attack; there are only Internet users trying to download Cryptogram at the same time. August 16, 2006 03:03 PM The most commonly-used shellcode string in all exploits since 1989 is not the machine code for /bin/sh, i...