Re: @amanfromMars 1 Lovely to see you posting again.
Methinks he's some sort of alien artificial intelligence
89 posts • joined 23 Nov 2009
"Because I don't believe this is possible without some information unwittingly leaking out from the encrypted data due to a fault in the encryption algorithm"
I don't even pretend to understand homomorphic encryption, but that sir, is the logical fallacy of personal incredulity.
"The argument from incredulity is a logical fallacy that occurs when someone decides that something did not happen, because they cannot personally understand how it could happen." - Rational Wiki
LastPass uses public-private key cryptography with RSA-2048 to allow users to share the key to their vault with trusted parties, without ever passing that information in an unencrypted format to LastPass. When Emergency Access is activated, each user has a pair of cryptographic keys - a public key to allow others to encrypt data for the user, and a private key that allows the user to decrypt the data that others have encrypted for them.
The key used to encrypt and decrypt your vault data is encrypted with the Emergency Access contact’s public key, and can be decrypted only with their corresponding private key. When setting up Emergency Access, you are using the recipient’s public key, encrypting your vault key with that public key, and then LastPass stores that RSA-2048 encrypted data until it’s released after the waiting period you specify. Only the recipient can decrypt the data, so no one else can decrypt it without access to the private key of the recipient you’re sharing it with, which is encrypted with their master password key. This process is completely automated, with no action required by the end user, and ensures that the data is inaccessible by LastPass or outside parties.
"That aside (for the moment), given that the hotels are private property, they are perfectly within their rights to prohibit people from using mobile hotspots, [..snip..] or for a store to prohibit use of mobile phones"
No, they're not. The FCC already ruled on this back in November of 2006. (http://news.cnet.com/FCC-Boston-airport-cant-block-airlines-Wi-Fi/2100-7351_3-6131618.html) Sure, a store or movie theater can ask you to leave if you're being a nuisance with your cell phone, but they cannot blanket "No cell phones."
Even Oracle's support for Oracle is godawful. I had a high-priority "performance is in the toilet, please advise" ticket in for a few days, sent Oracle a half dozen reports they requested and never heard a peep otherwise. Had to spend a few hours digging through trace myself. Thanks Larry!
So it should be OK to just steal whatever media you want? No.
The judgement amount is way out of whack with reality, but there needs to be some kind of penalty. Something like best estimate of actual damages plus punitive damages based on the defendant's ability to pay would be fair. We all know that what is eventually going to happen is that she's not going to be able to pay a $220,000 judgement, will file for bankruptcy, and her life will be slightly more annoying for 7 years 'till the bankruptcy clears. -- Assuming she has a house and car, she'll probably be able to keep those.
No, there aren't any cases of being tried and convicted twice, that would violate the 5th amendment to the US Constitution. This sort of thing is mainly used (IIRC) to prosecute citizens that commit crimes abroad that generally aren't punished in the country of commission. e.g.: American men going to Thailand to have sex with child prostitutes.
Biting the hand that feeds IT © 1998–2019