Hacker Newsnew | past | comments | ask | show | jobs | submit | chmodd's commentslogin

> governments who murder and torture their citizens.

What about governments that murder and torture citizens of other countries? The number of Iraqi and Afghani civilians killed by the US is pretty high - this fact alone is enough to make the US one of the worst human rights offenders in the world.


I can think of at least one counterexample, namely the failure of the NSA-promoted key escrow system in 1990s (aka Clipper chip)


And removing publicly available software crypto from the most serious export restrictions, at roughly the same time.


I hope it works out similarly to how proliferation of public wi-fi led to increased adoption of https.


Did you know it is illegal to broadcast encrypted signals on HAM radio? Wonder how long it will take for that to come to the internet.


Ham radio is a special case, and it is actually the Hams trying to block crypto. There is actually an FCC open rule making issue right now on the issue, and arrl is against it.

The solution is to develop protocols which use crypto but use a public key for now.


I saw that. Apparently issue is with self-monitoring. Also, would only be allowed for emergencies.


I didn't know that! I used to be a member of FidoNet (pre-internet network that provided e-mail and usenet-like services) back in 1990s and any commercial activity and encryption was similarly prohibited - relay operators were even supposed to read their users' mail and delete any messages that violated the rules.

I don't think there's any chance of this coming to the internet though. There are just too much uses for encryption besides conspiring for terrorist attacks.


It's terahash where hash means double sha256 that is used in the bitcoin proof-of-work protocol


Which is year 2140 or so


MD5 is so fast on GPUs, you can do some pretty ridiculous dictionary attacks in a matter of minutes (like trying every combination of words that has ever been written in a book or posted online - using google's n-gram corpus for example). Then you have plenty of time to try letter substitutions (3 for e), combinations such as word + number + word, etc. This doesn't apply of course, if your password is a long string of random characters.


I now do searches like this using Tor Browser. Just in case.


That probably doubles your chances of making it onto some list.


Now see, that's why everybody should use Tor now and then! :) That way this unique characteristic will become common enough for a generic filter on Tor users to become ineffective (by their measures). If you don't want to be seen connecting to Tor directory authorities and to relays directly, use a Tor bridge. Better yet, run one yourself! If you are using obfuscated bridges, you can (as of now) fool even pretty sophisticated DPI boxes which won't be able to fingerprint your traffic. (cf. continued Tor developers' battles with China's intense DPI infrastructure)

https://cloud.torproject.org/

https://www.torproject.org/docs/bridges#RunningABridge

Honestly though, "Tor user" will probably remain an interesting / valuable (by their standards) enough heuristic for a long time to come.


Can I suggest next time you have a perfectly normal and mundane need to access any government website - you fire up TOR Browser first? Go look up your local representative's name, or the garbage collection days for your suburb, but do it over TOR, and leave the trails in their logfiles.


I had a similar thought recently. People who are currently in their 20s and 30s had a unique privilege of growing up when fully-featured computers appeared in almost every household. A bored 13 year old kid getting a Pentium-166 desktop for Christmas is much more likely to start tinkering with the system, learn to program, hack, etc. than if his or her first computer was a walled garden iPad. Now with the huge success of smartphones and tablets, it may well happen that most households of 2025 won't even have a computer suitable for anything but media consumption and "apps".


mobile contracts are very rare in Russia, almost everyone is on a prepaid plan


By the way, bitcoin can no longer be efficiently mined on GPUs since the network hashrate has been increasing tremendously with ASICs (tenfold growth in the past 6 months and continuing steadily)


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: