In the very same sentence, Mr McDermott makes it clear that he is talking about the redundancy provided by the backup connection via France.
24 posts • joined 15 Oct 2009
Obviously the teeth in the picture can't be both "100 times thinner than the diameter of a human hair" and "just less than a millimetre long". How on earth did that slip past the proofreaders? That "100 times thinner" figure refers to the prepared samples that the scientists put in their strengthometer. You can see a picture at http://www.bbc.com/news/science-environment-31500883.
Also I suspect that it's the cross-sectional area that is 100 times less than a human hair, not the diameter.
"In truth, I can think of no better way to describe our failure to drop support for the Dual EC DRBG algorithm as anything other than regrettable."
You might want to run that through your internal parser a few times. It is a syntax error; but if it means anything, it means that he has no regrets at all over the failure to drop support for the rogue algorithm.
I once got paid real money to write a Dots and Boxes program (see http://en.wikipedia.org/wiki/Dots_and_Boxes). This game is NP-hard, according to Berlekemp et al's Winning Ways (p.534). But I didn't use any of the sophisticated approximate solutions that have been developed for such problems, I just tried to steer the game to one of the positions that the program could analyse in polynomial time.
The result was that I was the only human who could beat it on a large board, because I knew how to frustrate its goals.
That stuff about bicycle chains is surely an invention of Neal Stephenson's from his novel Cryptonomicon? You can read the relevant chapter at http://www.euskalnet.net/larraorma/crypto/slide18.html.
And yes, I know that HistoryArticles.Com supports this ridiculous notion (at http://www.historyarticles.com/enigma.htm), but I won't believe it until I see a pre-Cryptonomicon reference.
This attack, and a robust counter-measure to it, were published in 2005 in "Advances in Elliptic Curve Cryptography" (Blake, Seroussi, & Smart - editors). So you are wrong to say 'Security researchers have discovered a "timing attack"'. If you had taken the trouble to follow your own link and read the Abstract there, you would have seen that all the Secutiry Researchers have done is to take this hackneyed old idea and show that OpenSSL is still vulnerable to it.
>More to the point, why does the article refer to this as the 45th Mp, when (the infallible) Wikipedia gives it as the 47th?
Because it was the 45th Mersenne prime to be discovered, but currently the 47th largest known Mersenne prime. The author of this story has presumably just awoken from a thirteen-month sleep -- see http://www.mersenne.org/primes/m45and46.htm, dated 15th September 2008. I pointed this out in an earlier post, but it seems to have been rejected by Vulture Central.
Biting the hand that feeds IT © 1998–2019