asciilifeform: 'These aren't people assembled for an actual reason, as a result of merits. These are people whose merits are supposed to be predicated on the mere fact of having been assembled. Not quite the same thing.'
asciilifeform: umably come into effect at the beginning of next year.'
asciilifeform: 'While the Data Protection Commissioner was examining the BND in Bad Aibling, the secret service ramped up its equipment for 300 million Euros. And while the Commissioner waited for an answer to her report from the Chancellery, the government drafted a reform bill for the BND that not only legalizes the organization’s actions, but even increases its powers. This legislative package is scheduled to be adopted this year and will pres
asciilifeform: 'The Data Protection Commissioner is convinced, her supervision authority also extends „to SUSLAG and its staff members“. Therefore, she wanted to inspect this core area of BND-NSA collaboration. But the BND also blocked these attempts. The Commissioner and her staff are not allowed to enter the building and not even allowed to know how many people work there...'
asciilifeform: you'd like the thing to be the size of a breadbox ?
asciilifeform: because the thing didn't have a multiplier.
asciilifeform: i have not succeeded in coming up with a 6502 rsatron that manages to generate a key before the battery (of any reasonable size) and the owner's patience give way.
asciilifeform: mircea_popescu: i must point out that there is NO application where 'time does not matter'. for instance,
asciilifeform: itical manufacturing concentrated in the United States. This vulnerability can be exploited remotely.'
asciilifeform: etwork router product line. By impersonating the device, an attacker can obtain the credentials of administrative users and perform a Man-in-the-Middle (MitM) attack. Tropos has validated the vulnerability and produced an embedded operating software update that mitigates the reported vulnerability. According to Tropos, products are deployed across several sectors including the transportation, energy, water, emergency services, and cr
asciilifeform: 'This advisory provides mitigation details for a vulnerability that impacts Tropos Wireless Mesh Routers. An independent research group composed of Nadia Heninger (University of California at San Diego), Zakir Durumeric (University of Michigan), Eric Wustrow (University of Michigan), and J. Alex Halderman (University of Michigan) identified an insufficient entropy vulnerabilitya in SSH key generation in Tropos Networks’s wireless n
asciilifeform: it is not part of the 'monkey' net that includes 'corporate sites' etc.
asciilifeform: tropos is part of the 'vertical and horizontal' thing, in the sense where it is one of two dozen or so 'partners' for making sure that usg knows daily output, in millilitres, of oil well in venezuela, or that if texas breaks away from the ussa, it will not have working sewage pumps, etc.