curiousity

Member Profile


Member Since: December 4, 2007
Last Power Points used: March 12, 2011
Available: now
Power Points at Recharge: 1   Get More Power Points Now!

Comments to curiousity

JiggaJonson says...

It wont sink in, but thank you for at least trying to talk some sense into the jerk offs on this site. Speaking of which, am i the only one sick of the "Bill ORiley" account?

In reply to this comment by curiousity:
>> ^quantumushroom:
Liberals should be joyous America responded so milldly.
On September 12th, 2001, Afghanistan should've been a glass parking lot.


I agree.

This is why whenever I see a person jaywalk, I shoot everyone within 100 yards of that person. They allowed that person to jaywalk and deserve to die. Then I hunt down their families - by not properly raising them, they are supporting lawbreakers! It keeps me busy, but anything less of a response would mean that I'm a "qm liberal"... and I couldn't face that.

notarobot says...

Thanks for linking that. It made my day.

In reply to this comment by curiousity:
Some people really get their panties in a bunch (no offense ladies) because celebrities use fame to promote a particular cause.

How is using one's fame any different than using one's inherited or earned wealth to promote an idea?

Money, fame, time, etc are just tools that people use to promote their ideas.

>> ^Trancecoach:
>> ^volumptuous:So, depending upon your job dictates whether you can have an active role in politics or not?

Wrong. A person's job does not dictate the value of their opinions. These celebrities can vote in a democracy in any way they choose. When they speak out, with absolutely no basis from which they're speaking, and influence public policy is where I have a problem. If you want to take your political cues from how the Dixie Chicks, Spike Lee, Matt Damon, or Bono tell you to think, that's up to you. For journalists to cover it -- well that's relying on a crutch instead of doing real journalism and is a waste of the public attention.


Umm... Obviously there is a bit of frustration there. Seems you personally dealt with people that have based their opinion on a celeb's, etc opinion and hold onto that frustration. I do sympathize, but I think you are attacking the wrong thing here.

Maybe your real fight should be promoting civic and logic classes for people.

NordlichReiter says...

I always hit arstechnica.com, slashdot.org, techdirt.com, and wired.com for security news. I like wired and arstechnica, they have obscure topics covered. Digg has a bit here and there but, its more about social networking.

Security is a fun place for the grey hats.

In reply to this comment by curiousity:
ahh... I didn't realize you meant it as a joke.

No problem, its cool to talk about these things.

Have you looked at the way that ZRTP (VoIP protocol by Phil Zimmermann) handles Man in the Middle attacks? Seems like it would be effective.

Of course, most of this is new to me. I'm working my way into the field. Getting down basic knowledge and skills while trying to get familiar with the security community.

Thanks for your response!

In reply to this comment by NordlichReiter:
All software is victim of Obfuscation in network security, and in cryptography it is better to obfuscate the passphrase. AES Encryption works, thats been proven its a government standard. However no encryption is safe from Man in the Middle. No software that you distribute is safe from reverse engineering.

Security through obscurity is a joke, ( i meant it as a joke). Once the application has made it to the testing phase it can be broken. As for as the Encryption you have to have the pass phrase to decrypt it. A 20 character pass phrase may take a while to brute force. Even though you know how the program works you still have to know the pass phrase, considering the hash is in someone else's memory.

In reply to this comment by curiousity:
I don't know C# yet. It's in the plan though.

I'm not a big fan of "security through obsurity." I'm not saying that your system is insecure just that I'm not a fan of the obsurity method for security in matters like this.

Kerckhoff's Principle

Bruce Schneier, author of Applied Cryptography, "if the strength of your new cryptosystem relies on the fact that the attacker does not know the algorithm's inner workings, you're sunk. If you believe that keeping the algorithm's insides secret improves the security of your cryptosystem more than letting the academic community analyze it, you're wrong. And if you think that someone won't disassemble your code and reverse-engineer your algorithm, you're naive."


In reply to this comment by NordlichReiter:
http://www.videosift.com/video/Philip-Zimmermann-on-PGP-Pretty-Good-Privacy#addcomment

hey do you know any thing about c# ?

I wrote an windows form that does basically the same thing as PGP, but its not as user friendly.(security through obscurity) I use an SMTP Server, AES encryption, creatable passphrase. This was a private project, that I havent uploaded to the creative commons area yet, I'm lazy.

Its really very easy, I used a couple of methods from C# friends to mash it together. Only problem is, some email banks.. (AOL ) do not like encrypted emails.

NordlichReiter says...

All software is victim of Obfuscation in network security, and in cryptography it is better to obfuscate the passphrase. AES Encryption works, thats been proven its a government standard. However no encryption is safe from Man in the Middle. No software that you distribute is safe from reverse engineering.

Security through obscurity is a joke, ( i meant it as a joke). Once the application has made it to the testing phase it can be broken. As for as the Encryption you have to have the pass phrase to decrypt it. A 20 character pass phrase may take a while to brute force. Even though you know how the program works you still have to know the pass phrase, considering the hash is in someone else's memory.

In reply to this comment by curiousity:
I don't know C# yet. It's in the plan though.

I'm not a big fan of "security through obsurity." I'm not saying that your system is insecure just that I'm not a fan of the obsurity method for security in matters like this.

Kerckhoff's Principle

Bruce Schneier, author of Applied Cryptography, "if the strength of your new cryptosystem relies on the fact that the attacker does not know the algorithm's inner workings, you're sunk. If you believe that keeping the algorithm's insides secret improves the security of your cryptosystem more than letting the academic community analyze it, you're wrong. And if you think that someone won't disassemble your code and reverse-engineer your algorithm, you're naive."


In reply to this comment by NordlichReiter:
http://www.videosift.com/video/Philip-Zimmermann-on-PGP-Pretty-Good-Privacy#addcomment

hey do you know any thing about c# ?

I wrote an windows form that does basically the same thing as PGP, but its not as user friendly.(security through obscurity) I use an SMTP Server, AES encryption, creatable passphrase. This was a private project, that I havent uploaded to the creative commons area yet, I'm lazy.

Its really very easy, I used a couple of methods from C# friends to mash it together. Only problem is, some email banks.. (AOL ) do not like encrypted emails.

NordlichReiter says...

http://www.videosift.com/video/Philip-Zimmermann-on-PGP-Pretty-Good-Privacy#addcomment

hey do you know any thing about c# ?

I wrote an windows form that does basically the same thing as PGP, but its not as user friendly.(security through obscurity) I use an SMTP Server, AES encryption, creatable passphrase. This was a private project, that I havent uploaded to the creative commons area yet, I'm lazy.

Its really very easy, I used a couple of methods from C# friends to mash it together. Only problem is, some email banks.. (AOL ) do not like encrypted emails.

marinara says...

In reply to this comment by curiousity:
Glad you enjoyed it. It's an issue that seems to whimper through the night unless it is your property they are taking.



I never thought I would be interested in eminent domain, but the video was exciting, perhaps it was the personality of the debaters?

I have a housing forclosure crisis playlist here on videosift, and I like CSPAN type stuff.

So do you just browse through the FORA website to find stuff? or what focused you on the eminent domain issue?

Send this Article to a Friend



Separate multiple emails with a comma (,); limit 5 recipients






Your email has been sent successfully!

Manage this Video in Your Playlists

Member's Highest Rated Videos