Posted on 10/05/2005 7:42:38 AM PDT by N3WBI3
MS is not alone in doing this. Kodak and GE have been doing this for decades, though most of the time they just buy the small innovators, keep the brains and toss out the rest of the company.
They may be running down Google, but I use it almost exclusively. All the computers in the office still use the default MSN homepage and I will still go to Google instead. I have no use for a cluttered up search engine. Too many distractions when I want specific information.
Quit twisting the argument. The original claim was that obscurity and security can't co-exist. Encryption was the example. You can whine and spin all you want, but the facts remain that effective encryption is DEPENDENT on the OBSCURITY of the "private" key. That's why it's called a "private" key, and the idiots claiming that obscurity and security can't co-exist don't have a clue as to what they're talking about. Don't let that stop you from rushing to your defense. Or ignoring the fact I've repeatedly admitted public scrutiny of the algorithm is a typical practice. It's just not REQUIRED, like the privacy of the key is. Dingbat.
> I think I read somewhere that MS is moving its Word format to XML.
A proprietary XML format, protected by patent and a
binary header. Might as well not be XML at all.
No, some bozos were. The rest of us were waiting to see what Google has up its sleeve that could eventually threaten Microsoft's monopoly.
You quote a reporter who is just as incompetent at Web surfing as you are? As usual, you're wrong. Google did put out a press release about the alliance, contrary to your statement that it didn't, no matter how hard you try to spin it. It's there. Read it.
In this thread, that original claim was made by you, misquoting me, who said in another thread that obscurity provides no real security. You should not depend on it.
You can whine and spin all you want, but the facts remain that effective encryption is DEPENDENT on the OBSCURITY
As you have been told, quite confusing secrecy of a key with obscurity of the system. But, hey, if you want to put your private key out in the public, security guaranteed because it's obscured by ROT-13, be my guest.
It's good to know that you admit that disclosure of algorythms is "typical practice". Now, for homework, go read Applied Cryptography by Bruce Schneier so you can actually comment intelligently about cryptography.
Hey we agree on something :-) Google has done a great job of offering cool, quick, and reliable searches.
Although as of late I find Yahoo getting me better results than google as everyone knows google's logic and they are bombing it to get their pages on top.
I also use froogle as a quick way to find prices for items. It's not 100%, but it is quick and gives me what I need.
I used to use the google desktop search, but on a Windows system MSN has a better desktop search (wiht a ton of plug-ins) and it's more secure. Plus you get tabbed browsing within IE.
Bottom line, without properly applied obscurity, encryption can't be effectively secure. The rest is nothing but your laughable hysterics.
Remember when it was legal to export the book, but not the accompanying disk, even though the disk only contained what was listed in the book? ITAR's encryption controls produced some extremely strange and downright nonsensical results.
And one has to admire who well they have started to diversify themselves. Hardware (Search Appliances), the Google Earth Software, and much of the work going on at google labs (http://labs.google.com/). Really clever guys running that company.
Although as of late I find Yahoo getting me better results than google as everyone knows google's logic and they are bombing it to get their pages on top.
Supposedly yahoo has a bigger database now, but I just cant get over how cluttered their page feels. Usually if MS copies you it means you're doing something very right, and search.msn.com shows it.
There, that's better. But then even secrecy isn't necessary, as you could generate a key from biometrics. Then there's no secrecy, only security (e.g., making sure no one forces you up to the retinal scanner).
Any encryption that relies on obscurity is doomed to fail. And unlike the secrecy of a key, which would compromise one person's communication, compromise of the system due to penetration of the obscurity would compromise everybody.
Normal bunk. Then the digitized biometric key must be kept secret. You guys are beyond a joke.
Oh, yes. They ended up printing the source code for PGP in book form in an OCR font (with barcode checksums) to get around the stupid export restrictions.
For a long time I had the "RSA in 3 Lines of Perl" signature on my emails. I figured every single message I sent ot the Cypherpunks mailing list was worth about 10000 years in a federal pen.
Sometimes FedGov is dumber than a bunch of rocks. (Actually, I figure most times FedGov is dumber than a bunch of rocks.)
Good point and well said.
BTW, referring back to my previous message, the department of commerce officially classified the following as a munition, subject to export restrictions:
-export-a-crypto-system-sig -RSA-3-lines-PERL #!/bin/perl -sp0777i<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<j]dsj $/=unpack('H*',$_);$_=`echo 16dio\U$k"SK$/SM$n\EsN0p[lN*1 lK[d2%Sa2/d0$^Ixp"|dc`;s/\W//g;$_=pack('H*',/((..)*)$/)
confidentiality != obscurity
My private encryption key is named secring.gpg and lives in ~/.gnupg
There you go, no obscurity. You know where it is and you know exactly what to look for. Now you can try to decrypt my encrypted communications.
Let me know how that works out for you.
Actually, no. If you normalize the biometrics to get the same end mathematical result every time, then the biometric itself can be the key. No stored digitized key necessary, you provide it every time you provide the biometric.
But you get a gold star for finally recognizing the difference between secrecy and obscurity. Your education continues...
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.