Thad wrote:Nate Hoffelder wrote:Adobe is gathering data on
Adobe isn’t just tracking what users are doing in DE4
For the uninitiated like me, DE refers to Digital Editions.
Thad wrote:Nate Hoffelder wrote:Adobe is gathering data on
Adobe isn’t just tracking what users are doing in DE4
Sometimes, when I check my work email, I’ll find a message that says “Talk Announcement: Vertex-based Elliptic Cryptography on N-way Bojangle Spaces.” I’ll look at the abstract for the talk, and it will say something like this: “It is well-known that five-way secret sharing has been illegal since the Protestant Reformation [Luther1517]. However, using recent advances in polynomial-time Bojangle projections, we demonstrate how a set of peers who are frenemies can exchange up to five snide remarks that are robust to Bojangle-chosen plaintext attacks.” I feel like these emails start in the middle of a tragic but unlikely-to-be-interesting opera.
Researchers who work on problems like these remind me of my friends who train for triathlons. When I encounter such a friend, I say, “In the normal universe, when are you ever going to be chased by someone into a lake, and then onto a bike, and then onto a road where you can’t drive a car, but you can run in a wetsuit? Will that ever happen? If so, instead of training for such an event, perhaps a better activity is to discover why a madman is forcing people to swim, then bike, and then run.” My friend will generally reply, “Triathlons are good exercise,” and I’ll say, “That’s true, assuming that you’ve made a series of bad life decisions that result in you being hunted by an amphibious Ronald McDonald.” My friend will say, “How do you know that it’s Ronald McDonald who’s chasing me?”, and I’ll say “OPEN YOUR EYES WHO ELSE COULD IT BE?”, and then my friend will stop talking to me about triathlons, and I will be okay with this outcome.
After a 58-42 vote, the measure had the support of the majority – but it didn't get the 60 votes necessary to break a Republican filibuster. It was something of an odd end for a bill that had been approved by the Republican-controlled House back in May.
The USA Freedom Act sought to amend the Foreign Intelligence Surveillance Act of 1978, to "rein in the dragnet collection of data by the National Security Agency (NSA) and other government agencies, increase transparency of the Foreign Intelligence Surveillance Court," as its chief House sponsor, Rep. Jim Sensenbrenner, R-Wis., says in a summary on his website.
Huffington Post wrote:Paul said he voted against the bill because it would have extended the Patriot Act provision that allows the NSA to search Americans’ phone records. He has consistently opposed the Patriot Act, passed in the wake of the Sept. 11, 2001, terrorist attacks.
Leahy’s bill extended the provision’s expiration to June 2017 -- as a compromise, in order to change the law to stop the NSA from holding onto phone records. Under Leahy’s bill, that duty would have been handed off to phone companies. The companies' records could only have been searched with a surveillance court's order.
Politico wrote:Paul said immediately after the vote that he “felt bad” about his vote against the motion.
“They probably needed my vote,” he said, opposing Leahy’s bill because it would extend the sunset provisions for the laws authorizing surveillance. “It’s hard for me to vote for something I object to so much.”
epixoip wrote:To see just how solid PHPass is, let's look back at another famous breach which used PHPass: Forbes. Back in February, Forbes had 1,071,961 password hashes dumped by SEA. Out of those 1,071,961 password hashes, 1,071,734 were hashed using PHPass.
Now as the keen Ars reader will recall, normally us professional password crackers can get a public dump 85-95% cracked within a rather short period of time. And indeed, the 227 passwords that weren't hashed with PHPass were 100% cracked in just a few short minutes. But after 10 months, we currently only have the Forbes PHPass hashes 16.19% cracked. Yes, you read that correctly. We've only managed to crack 173,548 -- or 16.19% -- of the Forbes passwords, and most of those were Top 20K passwords.
Reportedly found in a folder called “Password,” a huge list of Excel files (many of which are unprotected) contained scores of what appear to be passwords for almost every system imaginable, from phones to AMEX logins and more.
a folder called “Password,”
In some ways, Mandia’s argument reflects the current wisdom in the security industry that, “There are two types of companies: Those that have been breached, and those that don’t know yet that they’ve been breached.” Yet, even for security professionals that accept that mantra, it does not mean that a successful compromise needs to lead to a significant breach, Levine told Ars.
Mongrel wrote:a folder called “Password,”
Mongrel wrote:I'm going to separate this out from the overall "The Interview discussion, because it relates specifically to absolutely boneheaded security practices.
Nextweb: New Sony Pictures leak appears to contain lists of passwords in plain text, security certificatesReportedly found in a folder called “Password,” a huge list of Excel files (many of which are unprotected) contained scores of what appear to be passwords for almost every system imaginable, from phones to AMEX logins and more.a folder called “Password,”
This is completely off topic but I wanted to mention the through these emails we learned that George Clooney is apparently the only person working with or for Sony that understand information security.
Users browsing this forum: Google [Bot] and 13 guests