Re: On the NSA breaking most encryption on the Internet Nah, it's a bit better than that, according to Schneier at least. He'd probably avoid ECC,...
On the NSA breaking most encryption on the Internet This is basically where the "Majority of Tor crypto keys could be broken by NSA, researcher...
New NSA Leak Shows MITM Attacks Against Major Internet Services
Re: How the feds asked Microsoft to backdoor BitLocker, their full-disk encryption tool Schneier's been working with the Snowden documents (in...
Out of curiosity, what all did you use to make this comparison? Wow. I wonder why no one else ever thought of that. ::) That's like saying "If...
One more aspect: If TrueCrypt was some high-level honeypot — even for completely innocent, benevolent purposes, as some seem to think possible...
Bingo. It's just like the front-facing camera...it removes all doubt and any plausible deniability as to who was using the device at any given...
1) It's just the 5S (for now). 2) All you have to do is put a piece of tape over it and it's completely bypassed. 3) The real goodies of...
First off, you might be interested in seeing here. (And be sure to check the links included there.) Basically on the whole I don't really think...
It starts... http://www.wired.com/dangerroom/2013/09/hydra-darpa/
Wired: The iPhone’s Fingerprint Sensor May Finally Mean the End of the PIN Wired: Apple’s Fingerprint ID May Mean You Can’t ‘Take the Fifth’
You obviously have no idea how Lastpass works.
Interesting, nothing in that article really matches the title. At best, it's misleading. That being said, nothing new here.
In all fairness, that's like saying: "There's no point in imprisoning people who have committed a crime. If you just kill them, there's no way...
Already posted: http://www.wilderssecurity.com/showpost.php?p=2279311&postcount=10
USA Today: Why fingerprints, other biometrics don't work
No one knows for sure, but reportedly it's only certain models that are more susceptible and can be remotely turned on. (Then again, that was the...
Steve Gibson is a hack. He's like the Dave Ramsey of the security world. The only analysis that matters is an audit of the javascript. Who has...
No...as I said you cannot be sure that's how it works without avoiding the binaries and using only the javascript (after auditing it, of course)...
Further: 1983 Article on the NSA Schneier: "The moral is that NSA surveillance overreach has been going on for a long, long time."
Here again I find that Schneier is off base...and here again, it's pointed out quite well in the comments:...
Well if you want to play that game, technically (i.e. biologically), Manning, at 25, is old enough to be the parent of those teens...that doesn't...
...all the same stuff they'd get if they were completely open source. Which makes their lame excuses in the comments largely irrelevant.
...Thanks for further making my point. :thumb:
Coincidentally (or perhaps not) Schneier had a somewhat related post recently: Government Secrecy and the Generation Gap
Separate names with a comma.