- Feature Articles
- CodeSOD
- Error'd
- Forums
-
Other Articles
- Random Article
- Other Series
- Alex's Soapbox
- Announcements
- Best of…
- Best of Email
- Best of the Sidebar
- Bring Your Own Code
- Coded Smorgasbord
- Mandatory Fun Day
- Off Topic
- Representative Line
- News Roundup
- Editor's Soapbox
- Software on the Rocks
- Souvenir Potpourri
- Sponsor Post
- Tales from the Interview
- The Daily WTF: Live
- Virtudyne
Admin
Double ROT13 should be plenty!
Admin
Your basically a parrot, who is simply repeating what he's heard in Computer Science classes.
Admin
Admin
he just overestimated his enemies that's basically why the article is here, because he got disappointed in them, when he learned the truth
Admin
Jesus is a very common name in all Portuguese and Spanish speaking countries. Also, Joshua is the Hebrew version of the same name. I think Jesus as a first name would sound weird in French or English speaking countries, but I don't think it's forbidden.
Admin
I was saying no need to encrypt the config section because you just perform a checksum or hash on the client configuration and compare it to the one saved on the vendor servers. Now that I think of it some more, this is probably more convoluted than it has to be... By simply encrypting the config with a private key and supplying the client with the matching public key should suffice. You know that they can read the configuration (who cares, it's their machines), but they can't tamper with it. Simple enough.
Admin
"Jesus" is a name that was as common in 1st-century Palestine as "Jacques" was in revolutionary France. It has been suggested by historians / archaeologists that it may have been used in a similar way: as a technique for confusing the authorities about who was who in the struggle for independence.
I'm not sure, but I believe it is not technically illegal to name your child either "Satan" or "Allah" in the UK. If someone were to do it, however, I expect that in the current illiberal political climate it would not remain legal long. Our freedoms are our freedoms as long as we don't dare to exploit them.
Admin
Makes me wonder if management and sales demanded this to generate more cash, but the software developer found that morally repulsive so he intentionally used something that most any other developer could break. Or maybe management just wanted an idiot filter. However the $100k for the "configuration tool" smacks of a greedy sales manager. Of course, its also possible that this was the only "encryption" the developer was familiar with. Personally I'm rooting for the developer who silently subverted management and sales.
Admin
Admin
Admin
Highly unlikely.
Admin
Admin
By a greedy lawyer who knows how to exploit the silly encrypting vs. encoding debate to convince the court that base64 is a viable security method? Of course.
By a judge who has no technical skills and has more important things to do? I'd wager it's happened before.
Admin
And your all wrong. The fundamental concept behind public-key encryption is exactly opposite to what you write, since those algorithm allows you to create two unrelated keys, one for encrypting (bound to be public) and one for decrypting (bound to be private). YOUR talking about private-key encryption, aka symmetric encryption. I leave you to Wikipedia for more details, they even came up with nice color drawings for those who failed to understand their CS classes.
Admin
An this is for all you pathetic jackwagons posting in Base-64:
Wkj3382KEKjfjkTquIkllP=
Admin
Admin
Seems my asshole comments have gotten in your head...
...soon my HEAD will be in your asshole, sweetness.
Admin
I wish all you ivory tower wannabes would get off your high horses. Base-64 is encryption! Do you even know what encryption means? It means to put in a code. Base-64 is a code. Now STFU.
An this is for all you pathetic jackwagons posting in Base-64:
Wkj3382KEKjfjkTquIkllP=
Admin
Actually I didn't say Base-64 is not encryption, I just reacted to Evan implying that public-key encryption uses the same key to encode and to decode, which is the opposite of what it is. I guess that if you consider Base-64 as an encryption method, it is not public-key encryption, because the encryption key (Base-64 encoding) and the decryption key (Base-64 decoding) are related, which is the definition of a symmetric encryption algorithm, which is also called private-key encryption, because the encryption key has to remain private to be of any use.
Addendum (2011-07-26 10:59): And also, I am not an ivory-tower wannabe. I have to intention of becoming an ivory tower, ever; I am fine as a human being, thanks. I guess half-machine half-man would be ok, depending on the parts replaced, but ivory tower, never!
Admin
Ok, when I'm reimplementing the weel I usualy encode criptographed strings on base 16... But most people prefer to encode them on base 64.
Admin
TRWTF is the baffling length of the tedious argument that appears to still be going on.
Admin
They're bored, they're waiting for today's WTF.
Admin
Truly you are a comedic genius with an abundance of original ideas and fascinating insights.
Post it again, won't you?
Admin
No, the TRWTF is you ivory tower wannabes thinking that just because encryption and encoding couldn't reasonably be confused in practire that its not worth recognizing that they are technically the same in theory.
theory > practice, everyone outside of your ivory tower (who doesn't have there head up they're ass)knows that.
Admin
Who cares?
Admin
Admin
Admin
Admin
An this is for all you pathetic jackwagons posting in Base-64:
Wkj3382KEKjfjkTquIkllP=
Admin
An this is for all you pathetic jackwagons posting in Base-64:
Wkj3382KEKjfjkTquIkllP=
Admin
An this is for all you pathetic jackwagons posting in Base-64:
Wkj3382KEKjfjkTquIkllP=
Admin
An this is for all you pathetic jackwagons posting in Base-64:
Wkj3382KEKjfjkTquIkllP=
Admin
An this is for all you pathetic jackwagons posting in Base-64:
Wkj3382KEKjfjkTquIkllP=
Admin
An this is for all you pathetic jackwagons posting in Base-64:
Wkj3382KEKjfjkTquIkllP=
Admin
An this is for all you pathetic jackwagons posting in Base-64:
Wkj3382KEKjfjkTquIkllP=
Admin
An this is for all you pathetic jackwagons posting in Base-64:
Wkj3382KEKjfjkTquIkllP=
Admin
An this is for all you pathetic jackwagons posting in Base-64:
Wkj3382KEKjfjkTquIkllP=
Admin
An this is for all you pathetic jackwagons posting in Base-64:
Wkj3382KEKjfjkTquIkllP=
Admin
An this is for all you pathetic jackwagons posting in Base-64:
Wkj3382KEKjfjkTquIkllP=
Admin
An this is for all you pathetic jackwagons posting in Base-64:
Wkj3382KEKjfjkTquIkllP=
Admin
An this is for all you pathetic jackwagons posting in Base-64:
Wkj3382KEKjfjkTquIkllP=
Admin
An this is for all you pathetic jackwagons posting in Base-64:
Wkj3382KEKjfjkTquIkllP=
Admin
For the convenience of readers of this thread etc., perhaps TDW could point out that if even Google doesn't solve it, they're on the wrong website.
Admin
Download? Plugin? gtools I tell ya!
Admin
Admin
Admin
Admin
If you chopped into strings of different length, it wouldn't be the same algorithm, because that algorithm specifies a certain length.
Again, you could write an algorithm which received the length as a "key", but it wouldn't be base64.
Admin
Admin
This also applies to Pig-Latin, a form of encryption that utilizes an encoding algorithm in which the "key" is part of the algorithm.