Klimaforskning - hjemmeside
Startet av Amatør1, desember 22, 2011, 23:17:26 PM
SitatI did point out why the leaker had released encoded material because it was a way of doing a bit of insurance. All that's needed to decode the entire part of the release is a simple code phrase and that's probably on a bulk email timer somewhere that's being periodically reset by FOIA. If FOIA gets nabbed, then the bulk email giving the pass phrase goes out automatically to every major skeptic worldwide and we'll all have some interesting emails to read over breakfast the next morning. I call that the Nuclear Backup Option.
SitatAnyway, the most interesting point of the conversation came out when she said in very rough paraphrase 'Their side is that the email releases were known to you ahead of time.'The 'their side' was fairly interesting as we know the "Climate Scientists™" are in good contact with the NYT as are the government agencies. It could have been nothing but often when you hear inflection of how something is said, you can get the meaning. I took it as though she had been talked too by someone of the opinion that the three blogs mentioned in the DOJ letter were intimately involved.The fact that I have done nothing wrong does not relieve me one tiny bit regarding the police. This is especially true when a billion dollar industry is involved. Those who haven't dealt with law won't get that. What gives me comfort is that this blog and its global friends have a wide readership means that ANY direct police action will have a wide public audience – not that it will stop the crazy stuff anyway. That is the limit of my protection.
SitatSince 1977, RSA public-key encryption has protected privacy and verified authenticity when using computers, gadgets and web browsers around the globe, with only the most brutish of brute force efforts (and 1,500 years of processing time) felling its 768-bit variety earlier this year. Now, three eggheads (or Wolverines, as it were) at the University of Michigan claim they can break it simply by tweaking a device's power supply. By fluctuating the voltage to the CPU such that it generated a single hardware error per clock cycle, they found that they could cause the server to flip single bits of the private key at a time, allowing them to slowly piece together the password. With a small cluster of 81 Pentium 4 chips and 104 hours of processing time, they were able to successfully hack 1024-bit encryption in OpenSSL on a SPARC-based system, without damaging the computer, leaving a single trace or ending human life as we know it.
Sitat fra: Bebben på januar 15, 2012, 13:59:44 PMInteressant! Er dette kjent for "the usual suspects" i bloggosfæren?
Sitat fra: Amatør1 på januar 15, 2012, 20:19:13 PMSitat fra: Bebben på januar 15, 2012, 13:59:44 PMInteressant! Er dette kjent for "the usual suspects" i bloggosfæren?Vet ikke... tror det var en på BH som kommenterte dette, men har mistet linken