And the Target situation reeks of an inside job. ...Jim Thompson
And the Target situation reeks of an inside job. ...Jim Thompson
-- | James E.Thompson | mens | | Analog Innovations | et | | Analog/Mixed-Signal ASIC's and Discrete Systems | manus | | San Tan Valley, AZ 85142 Skype: Contacts Only | | | Voice:(480)460-2350 Fax: Available upon request | Brass Rat | | E-mail Icon at http://www.analog-innovations.com | 1962 | I love to cook with wine. Sometimes I even put it in the food.
On Mon, 23 Dec 2013 14:52:42 -0600, Jon Elson Gave us:
Batch processing went away ages ago.
On Mon, 23 Dec 2013 14:52:42 -0600, Jon Elson Gave us:
WRONG METHOD. PROBABLY ILLEGAL.
The bastards also flood my iPad email address, and sold that info to a bunch of other retarded bastards.
On Mon, 23 Dec 2013 17:26:54 -0700, Jim Thompson Gave us:
You can bet. There was no inadvertent web browsing introducing some smart ass's trojan client.
This was a set-up. A block retrieval.
Target probably should take a dive for it too. It will certainly harm Americans yet one more smite.
We need to start boycotting the bullshit.
"No no" hair removal... all that shit. If it is NOT legitimate, it should not be showing up in front of my face.
Goddamned snake oil idiots everywhere.
My gut feeling about these types of events tells me that the majority of them are inside jobs. The problem is however, they know the people working for them will notice at some point and possibly take advantage of it. Those are the ones they let slide a little as they put their hands in the cookie jar. When things get too hot, they have their fall guy.
You see, when doing big theft like that, you have to allow some small amount of people to do a little theft on your behalf :)
It's the way business colleges teach good business practices these days :)
Jamie
It's only an iPad, how much would you expect from it anyway !
Jamie
Almost true. The only exception is the one-time pad.
This is uncrackable.
This is true only as long as any keys both on the source as well as any destination site are destroyed before any "secret" transaction has been known to performed by a hostile partner.
Not for "hand delivered" keys.
Susceptible to rectothermal cryptoanalysis
Best regards, Spehro Pefhany
-- "it's the network..." "The Journey is the reward" speff@interlog.com Info for manufacturers: http://www.trexon.com Embedded software/hardware/analog Info for designers: http://www.speff.com
In theory, reality and theory are the same. In reality, they are not.
Oh! Is that how miso and bloggs do it ?>:-} ...Jim Thompson
-- | James E.Thompson | mens | | Analog Innovations | et | | Analog/Mixed-Signal ASIC's and Discrete Systems | manus | | San Tan Valley, AZ 85142 Skype: Contacts Only | | | Voice:(480)460-2350 Fax: Available upon request | Brass Rat | | E-mail Icon at http://www.analog-innovations.com | 1962 | I love to cook with wine. Sometimes I even put it in the food.
If used correctly:
Joe Gwinn
JT > This is uncrackable.
Wrong. OTPs have been broken throughout history. The reality is that nothing around the OTP is secure, primarily because humans are involved.
Irrelevant.
...and there, reality sets in.
No, he's certainly *NOT* right.
Interesting history. That led to
which relates the Venona connection: According to Feklisov, Rosenberg provided thousands of classified (top secret) reports from Emerson Radio, including a complete proximity fuze, an upgraded model of which was used to shoot down Gary Powers' U-2 in 1960. Under Feklisov's administration, Rosenberg is said to have recruited sympathetic individuals into NKVD service, including Joel Barr, Alfred Sarant, William Perl and Morton Sobell.[11] The Venona intercept shows that Julius Rosenberg (code name LIBERAL) was the head of this particular spy ring.
According to Feklisov, he was supplied by Perl, under Julius Rosenberg?s direction, with thousands of documents from the National Advisory Committee for Aeronautics, including a complete set of design and production drawings for the Lockheed's P-80 Shooting Star. Feklisov says he learned through Rosenberg that his brother-in-law David Greenglass was working on the top-secret Manhattan Project at the Los Alamos National Laboratory; he used Julius to recruit him.[10]
Oh what a web we weave, ...
Cheers, James Arthur
The 2005 thru 2007 TJ Maxx incident, where 45 million credit card numbers were leaked, was done by hacking the stores wi-fi network, which then gave them access to the main database. No skimming involved.
Credit card skimmers were involved in far too many credit card thefts to pin down to a single incident. They tend to grab a few hundred credit card numbers at a time with moderate risk as the perpetrator has to appear at the scene twice, once to install the skimmer and once to retreive the data. How many of these skimmers would you have spotted? The latest devices are at the bottom of the page.
Making such devices has also become fashionable using 3D printers.
There are also the usual keyboard data loggers:
-- Jeff Liebermann jeffl@cruzio.com 150 Felker St #D http://www.LearnByDestroying.com Santa Cruz CA 95060 http://802.11junk.com Skype: JeffLiebermann AE6KS 831-336-2558
Ummm... Despite rumors of its demise, batch processing is still very much with us today. etc.
Another version can be found in cloud computing. For example, Amazon Elastic Compute Cloud (EC2), which adjusts resource utilization to match the job requirements. Not exactly job control but close enough.
-- Jeff Liebermann jeffl@cruzio.com 150 Felker St #D http://www.LearnByDestroying.com Santa Cruz CA 95060 http://802.11junk.com Skype: JeffLiebermann AE6KS 831-336-2558
-- The involvement of humans is a separate issue, and has nothing to do with the inherent security of the technique.
ElectronDepot website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.