by cost I don't necessarily mean $, there's also risk of getting caught, which is an implicit cost you must assume *on each compromise*.
-
-
The government requires speed? Since when?
-
200 sovereign nations, 10s of thousand of agencies each, many departments, many employees. Then in the hearings they talk of timelines in hours and days.
- 45 more replies
New conversation -
-
-
Absolutely. When designing key management procedures frequency of access is the single largest constraint to making an effective system.
-
Hmm, I think that's a pretty strong argument. However... it is slightly weakened by the fact that build servers are already built that way, and a compromise is *effectively* just as bad... what do you think?
- 3 more replies
New conversation -
-
-
“Behind the Scenes of iOS Security” talk at BlackHat USA 2016, starting at 26:45, has a lot of information about Apple’s secure HSMs used for protecting user keys in iCloud with a 6-digit passcode, and how they prevent bruteforce attacks.https://youtu.be/BLGFriOKz6U
-
At 26:45 ???
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.
