The emperor lives naked in a glass house. Better learn to be discrete.
I have often wondered if anyone has bothered to read the Constitutional authorization: "To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries." It seems the key words are "To promote the Progress of Science and useful Arts" and "limited Times". It could be argued that the current patent and even more the current copyright regimes are unconstitutional.
OTP is considered the most secure method with a couple of caveats. There is a maximum length for each message. Each pad must generated in a way that does provide clues into it or others. The pads can never be reused.
Or the correct nickname for the NY Times: "The Grey Whore".
With burner phones, encryption is less critical because it is difficult to trace the phone to specific person. By regularly buying and ditching burner phones and careful sharing of the numbers it is very difficult to tie all the less ends together.
This smells of the DOJ surrendering. They lost key elements of public opinion and pretty much anyone who has fair understanding of cryptography. They also made it imperative the tech industry should push back in Congress which could really make their lives deservedly miserable.
There are several problems with academic publishing. First the publishers often charge the authors a fee to publish. Second the authors are required to surrender their copyright to the publisher. Third the subscriptions and charges per article are unaffordable for most individuals. Fourth, often the research is sponsored by a government agency thus the taxpayers. All are troubling but the last is most.
Also, the idea of publication and peer review is to get results and theories out to the wider academic community not to make a publishing house rich.
As far as breaking codes, natural languages have sound thus letter patterns in the language. If the encrypted text is long enough, the text will have essentially the same distribution as the language. Also, many encrypted messages, particularly government/military tend to have an internal structure much like a business letter. Both of these patterns give clues allowing code breaking. This was observed in the 1920's by William Friedman.
Also, the strength of cypher system is based on the underlying technology used to create it. Modern computer based systems are mathematically very strong for our current technology but they can be broken if one has enough computational power and enough time.
Back to San Bernardino, there is another rule about intelligence: it goes stale the older the information. Even if there is intelligence information on the phone, as it ages it will become much less useful overall.
The major problem for EVs both historical and current is not range or performance but recharging time. Once the recharging time is much shorter they will become more popular.
From an maintenance point of view, EVs are mechanical simpler and overall more reliable (both historical and current).
This series of events raises the question about the IT person. Was this person a friend? And did they change the password, which should be known, deliberately?
Many very legitimate businesses will be essentially cash only dependent on the demographics and local area they serve. The problem is with bureaucrats who do not actually try to understand how many businesses work and why.
Remember about someone who is only interested in power for her benefit. She will lie, cheat, steal, sell secrets, whatever if she thinks it will get her power.
Remember about someone who is only interested in power for her benefit. She will lie, cheat, steal, sell secrets, whatever if she thinks it will get her power.
But can Sony prove they own the copyright. What they might is a copyright to a movie/TV/recording performance of the Over There. The is not a copyright of the song itself.
Also, I would like to see them enforce a claim against the original recording (1917/1918) by Nora Bayes who did in the mid 20's.
On the post: Time Warner, Defenders Of Copyright, Forced To Pay Up For Copyright Infringement
Emperor's Clothes
I have often wondered if anyone has bothered to read the Constitutional authorization: "To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries." It seems the key words are "To promote the Progress of Science and useful Arts" and "limited Times". It could be argued that the current patent and even more the current copyright regimes are unconstitutional.
On the post: Did The DOJ Lie At The Beginning Of Its iPhone Fight, Or Did It Lie This Week?
Re: Re: Re:
On the post: French Police Report On Paris Attacks Shows No Evidence Of Encryption... So NY Times Invents Evidence Itself
Re:
With burner phones, encryption is less critical because it is difficult to trace the phone to specific person. By regularly buying and ditching burner phones and careful sharing of the numbers it is very difficult to tie all the less ends together.
On the post: DOJ To Court: Hey, Can We Postpone Tomorrow's Hearing? We Want To See If We Can Use This New Hole To Hack In
Re:
On the post: As Predicted, Elsevier's Attempt To Silence Sci-Hub Has Increased Public Awareness Massively
Re: Cost of access
Also, the idea of publication and peer review is to get results and theories out to the wider academic community not to make a publishing house rich.
On the post: Author Sues Half The Internet For Defamation, Copyright Infringement, Cyberbullying, Use Of Section 230
Which is better
On the post: Medical Examiner Sues City Of New York After Being Forced Out Of Her Job For Questioning DNA Testing Techniques
What Else is new
On the post: Apple's Response To DOJ: Your Filing Is Full Of Blatantly Misleading Claims And Outright Falsehoods
Re: Re:
On the post: President Obama Is Wrong On Encryption; Claims The Realist View Is 'Absolutist'
Re: Hoisted, petard, own...
Also, the strength of cypher system is based on the underlying technology used to create it. Modern computer based systems are mathematically very strong for our current technology but they can be broken if one has enough computational power and enough time.
Back to San Bernardino, there is another rule about intelligence: it goes stale the older the information. Even if there is intelligence information on the phone, as it ages it will become much less useful overall.
On the post: DailyDirt: Horsepower? Why Are We Measuring Anything With Horse-Based Units?
EV
From an maintenance point of view, EVs are mechanical simpler and overall more reliable (both historical and current).
On the post: DailyDirt: Horsepower? Why Are We Measuring Anything With Horse-Based Units?
Re:
On the post: President Obama Is Wrong On Encryption; Claims The Realist View Is 'Absolutist'
Equation
Lawyer = Shyster = Politician = Criminal = Traitor
On the post: Senators Burr And Feinstein, Once Again, Threatening New Bill To Backdoor Encryption
Too Bad
On the post: Apple Might Be Forced To Reveal & Share iPhone Unlocking Code Widely
Interesting Issue
On the post: Footnote Reveals That The San Bernardino Health Dept. Reset Syed Farook's Password, Which Is Why We're Now In This Mess
He had a buddy in IT?
On the post: Court Won't Let Government Screw Forfeiture Victim Out Of Legal Fees
Re: Re: Hide everything to stay legal.
On the post: Hillary Clinton Flip Flopped On TPP Before, So Big Business Lobbyists Are Confident She'll Really Flip Back After Election
Clinton != morals/ethics
On the post: Hillary Clinton Flip Flopped On TPP Before, So Big Business Lobbyists Are Confident She'll Really Flip Back After Election
Clinton != morals/ethics
On the post: Stupid Patent Of The Month: Sharing Your Hard Copy Documents, But On A Social Network
Re: A joke (but not really)
On the post: Pick A Side: Video Of Creepy Girls Singing To Donald Trump Taken Down Over Copyright On WWI Song
Re: Re: How could it be copyrighted?
Also, I would like to see them enforce a claim against the original recording (1917/1918) by Nora Bayes who did in the mid 20's.
Next >>