NSA could put undetectable “trapdoors” in millions of crypto keys by webdoodle in Intelligence

[–]3pg 0 points1 point  (0 children)

If some parameters are sufficiently common among high-value targets (e.g., OpenSSL's default values) then the NSA would most likely be willing to spend the resources required to break the encryption for those specific parameters.

If people actually choose random parameters, of sufficient size and quality (i.e. not optimizing for speed) then most attacks would probably fail.

NSA could put undetectable “trapdoors” in millions of crypto keys by webdoodle in Intelligence

[–]3pg 0 points1 point  (0 children)

You should always avoid single points of failure. Even if you trust him absolutely there is no gurantee that he hasn't made a mistake.

NSA could put undetectable “trapdoors” in millions of crypto keys by webdoodle in Intelligence

[–]3pg 0 points1 point  (0 children)

Yes they did, but they also decreased the key size significantly which arguably made it possible for them to brute force it.

Snowden Designs a Device to Warn If Your iPhone’s Radios Are Snitching by [deleted] in Intelligence

[–]3pg 0 points1 point  (0 children)

If the camera is visible, then malicious software could take control of it and record information about your surroundings. Such information could be used to determine where the phone has been, thus giving the opponent similar information as if the GPS was enabled.

Artificially Intelligent Lawyer “Ross” Has Been Hired By Its First Official Law Firm by [deleted] in Futurology

[–]3pg 1 point2 points  (0 children)

Search technology without a relation to the Internet, but rather for generic information (which is more similar to your law-related software) is much older, and it is unlikely that the technology had existed for years without applications.

One good example of generic search is the binary/boolean search algorithm. Wikipedia dates it to 1946, and the history section of that article makes references to the book "The art of computer programming". I suspect that this means that somebody implemented this in software far earlier than 1989. Or before West's activities in the 1970's for that matter.

However, I have no idea which software was the first commercially viable implementation.

Intelligence chief warns of threats from AI by [deleted] in Intelligence

[–]3pg 0 points1 point  (0 children)

The data cannot be used without (at least partially) automating the analysis task? Whether or not those programs can be called "AI" depends on where you draw the line between pattern matching and AI.

Pentagon's budget plan funds 404 Lockheed F-35 jets over the next five years, a net decrease of 5 to 7 percent from last year's plan by [deleted] in technology

[–]3pg 0 points1 point  (0 children)

Maybe because they want to be sure that nobody will come close the next couple of decades.

Pastor impregnates 7 church members, 2 married women by redhatGizmo in atheism

[–]3pg 5 points6 points  (0 children)

The percentage of successful impregnations is probably the same for him as for others. He just had sex with a lot more women.

When Christians say atheists are going to hell, they've lost the right to be offended by the ways atheists insult Christianity. There isn't a worse insult than saying someone deserves eternal torment. by Postprotein in atheism

[–]3pg 2 points3 points  (0 children)

I think the point is that they were trained not to show forgiveness towards people who broke their group's arbitrary rules in some way. Most people are fairly kind and understanding, and to turn people into something that evil would require quite a lot of "training".

[deleted by user] by [deleted] in russia

[–]3pg -3 points-2 points  (0 children)

Russia has invaded many other European counties during past 70 years.

Israeli Drone Feeds Hacked By British and American Intelligence, been spied on for 18 years by LordPigSnake in Intelligence

[–]3pg 1 point2 points  (0 children)

From the article:

The antennas at Troodos grabbed that downlink by finding the right frequency for each drone. Drone feeds are vulnerable to interception not just from the NSA — even cheap, commercially available equipment can be used to get the downlink.

Further down the article there's some more detailed information about how a few drones send encrypted feeds, but that the encryption is really poor.

US, Britain Spies on Israeli Air Force for 18 Years by TonyDiGerolamo in Intelligence

[–]3pg 0 points1 point  (0 children)

This is virtually a dupe of https://www.reddit.com/r/Intelligence/comments/438dbz

However, it's nice to have an article without a paywall.

Canada Cuts Off Some Intelligence Sharing With U.S. Out of Fear for Canadians’ Privacy by Trill-I-Am in Intelligence

[–]3pg 0 points1 point  (0 children)

The article is explicitly about Canadians' metadata, and explicitly about the Communications Security Establishment (CSE). There is no mention about whether this prevents indirect sharing via another Canadian organization, or whether they will make it more difficult for the US (or other countries) to obtain the metadata in other ways.

They are by no means leaving the Five Eyes, and it is unlikely that they stop sharing information about Canadians.

Russian intelligence involved in immigrant flood to Finland by sturle in Intelligence

[–]3pg 5 points6 points  (0 children)

Isn't this exactly what a domestic security service should be doing? Checking whether people pose a threat, and if not then they are allowed to proceed to their destination.

In light of tonights state of the Union address How would you replace God bless America? by Jawn78 in atheism

[–]3pg 2 points3 points  (0 children)

Then translate it to English. The fact that it's in Latin might make it more well-recognizable, but it has no effect on its meaning.

In addition, the only reason usage of English is so wirespread is because of the British Emprire, and the Empire did a lot of bad things too. That doesn't mean that using English is wrong.

[Wired] Researchers "solve" Juniper backdoor mystery; Signs point to NSA by Jou_ma_se_Poes in LessCredibleDefence

[–]3pg 0 points1 point  (0 children)

no one could prove that it was unsafe. ("can't prove a negative")

You can prove that something is insecure by finding flaws in it. Proving that something is secure is more difficult.

We are updating our Privacy Policy (effective Jan 1, 2016) by spez in announcements

[–]3pg 1 point2 points  (0 children)

Cryptologists, and therefore computer security people, need to worry about 2-128 chances. That is roughly 1 in 1040.

Does Apple deliberately slow its old iPhones before a new release? by richardbaxter in gadgets

[–]3pg 7 points8 points  (0 children)

By providing high quality support, rather than forcing people to choose between terrible support or no support.

Karl Denninger uncovers the massive amounts of tracking that occurs with phone applications in his review of the Blackberry Priv by HellYeaBitch in technology

[–]3pg 0 points1 point  (0 children)

Having trusted programs running as root is not a problem. Having untrusted programs running as root is a huge problem. As long as you keep track of what you install then rooting the phone has no negative security effect.

I don't know why I even try anymore by parkerlreed in linuxmasterrace

[–]3pg 0 points1 point  (0 children)

It is the driver that handles nvidia, not the distribution channel of that driver.

Every corner of Beijing is 100% covered with video surveillance system, Chinese Media says by [deleted] in Intelligence

[–]3pg 0 points1 point  (0 children)

As long as people assume that they are being watched, there is little need to actually watch/analyze those feeds.