Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Is Microsoft Running Scared of OpenDocument?
PDF Zone ^ | 10-3-2005 | Steven J. Vaughan-Nichols

Posted on 10/05/2005 7:42:38 AM PDT by N3WBI3

click here to read article


Navigation: use the links below to view more comments.
first previous 1-20 ... 81-100101-120121-140 ... 341-353 next last
To: coconutt2000
Correction: They copy what the smaller, more innovative companies do. And more often then not, patent it and run the smaller businesses out of business.

MS is not alone in doing this. Kodak and GE have been doing this for decades, though most of the time they just buy the small innovators, keep the brains and toss out the rest of the company.

101 posted on 10/06/2005 4:56:11 AM PDT by EricT.
[ Post Reply | Private Reply | To 7 | View Replies]

To: N3WBI3

They may be running down Google, but I use it almost exclusively. All the computers in the office still use the default MSN homepage and I will still go to Google instead. I have no use for a cluttered up search engine. Too many distractions when I want specific information.


102 posted on 10/06/2005 5:10:36 AM PDT by EricT.
[ Post Reply | Private Reply | To 74 | View Replies]

To: zeugma
I can't believe that anyone would be so incredibly ignorant as to believe that because keys are kept secret, it is some kind of argument for or against public disclosure of encryption algorithms.

Quit twisting the argument. The original claim was that obscurity and security can't co-exist. Encryption was the example. You can whine and spin all you want, but the facts remain that effective encryption is DEPENDENT on the OBSCURITY of the "private" key. That's why it's called a "private" key, and the idiots claiming that obscurity and security can't co-exist don't have a clue as to what they're talking about. Don't let that stop you from rushing to your defense. Or ignoring the fact I've repeatedly admitted public scrutiny of the algorithm is a typical practice. It's just not REQUIRED, like the privacy of the key is. Dingbat.

103 posted on 10/06/2005 5:23:00 AM PDT by Golden Eagle
[ Post Reply | Private Reply | To 99 | View Replies]

To: stripes1776

> I think I read somewhere that MS is moving its Word format to XML.

A proprietary XML format, protected by patent and a
binary header. Might as well not be XML at all.


104 posted on 10/06/2005 5:32:59 AM PDT by Boundless
[ Post Reply | Private Reply | To 92 | View Replies]

To: Golden Eagle
Meanwhile, you bozos run around saying

No, some bozos were. The rest of us were waiting to see what Google has up its sleeve that could eventually threaten Microsoft's monopoly.

105 posted on 10/06/2005 5:43:19 AM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 98 | View Replies]

To: Golden Eagle
" It is telling that the press release didn’t even appear on Google’s website, only on Sun’s. "

You quote a reporter who is just as incompetent at Web surfing as you are? As usual, you're wrong. Google did put out a press release about the alliance, contrary to your statement that it didn't, no matter how hard you try to spin it. It's there. Read it.

106 posted on 10/06/2005 5:48:21 AM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 97 | View Replies]

To: Golden Eagle
Quit twisting the argument. The original claim was that obscurity and security can't co-exist.

In this thread, that original claim was made by you, misquoting me, who said in another thread that obscurity provides no real security. You should not depend on it.

You can whine and spin all you want, but the facts remain that effective encryption is DEPENDENT on the OBSCURITY

As you have been told, quite confusing secrecy of a key with obscurity of the system. But, hey, if you want to put your private key out in the public, security guaranteed because it's obscured by ROT-13, be my guest.

107 posted on 10/06/2005 6:03:15 AM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 103 | View Replies]

To: EricT.
Eric,

Im the same way. I was a long time Yahoo holdout until I started needing a useful search engine and not a bunch of advertisements, animated gifs and other crap cluttering my screen.

I find Googles interface rather elegant, so much so that Microsoft the search engine has copied googles search engine. I made the switch over to google complete by dumping my own email server in favor of theirs, though I do use fetchmeail to pull it down locally.

Google is everything yahoo and early web portals could have been they found a way to make it work and it works well. No matter how often our more controversial tech thread visitors run them down they can not take way from their success..
108 posted on 10/06/2005 6:52:37 AM PDT by N3WBI3 (If SCO wants to go fishing they should buy a permit and find a lake like the rest of us..)
[ Post Reply | Private Reply | To 102 | View Replies]

To: Golden Eagle
This is typical trollish picking of nits that I was talking about. A claim that because your private key material has to be kept confidential somehow supports the concept of "security by obscurity" is nothing but assinine wordplay.

It's good to know that you admit that disclosure of algorythms is "typical practice". Now, for homework, go read Applied Cryptography by Bruce Schneier so you can actually comment intelligently about cryptography.

109 posted on 10/06/2005 7:27:30 AM PDT by zeugma (Warning: Self-referential object does not reference itself.)
[ Post Reply | Private Reply | To 103 | View Replies]

To: zeugma
algorythms=algorithms
maybe it was biorythms?
110 posted on 10/06/2005 7:33:33 AM PDT by zeugma (Warning: Self-referential object does not reference itself.)
[ Post Reply | Private Reply | To 109 | View Replies]

To: N3WBI3

Hey we agree on something :-) Google has done a great job of offering cool, quick, and reliable searches.

Although as of late I find Yahoo getting me better results than google as everyone knows google's logic and they are bombing it to get their pages on top.

I also use froogle as a quick way to find prices for items. It's not 100%, but it is quick and gives me what I need.

I used to use the google desktop search, but on a Windows system MSN has a better desktop search (wiht a ton of plug-ins) and it's more secure. Plus you get tabbed browsing within IE.


111 posted on 10/06/2005 8:25:07 AM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 108 | View Replies]

To: zeugma; antiRepublicrat

Bottom line, without properly applied obscurity, encryption can't be effectively secure. The rest is nothing but your laughable hysterics.


112 posted on 10/06/2005 8:37:41 AM PDT by Golden Eagle
[ Post Reply | Private Reply | To 109 | View Replies]

To: zeugma
Now, for homework, go read Applied Cryptography by Bruce Schneier so you can actually comment intelligently about cryptography.

Remember when it was legal to export the book, but not the accompanying disk, even though the disk only contained what was listed in the book? ITAR's encryption controls produced some extremely strange and downright nonsensical results.

113 posted on 10/06/2005 8:43:53 AM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 109 | View Replies]

To: for-q-clinton
Google has done a great job of offering cool, quick, and reliable searches.

And one has to admire who well they have started to diversify themselves. Hardware (Search Appliances), the Google Earth Software, and much of the work going on at google labs (http://labs.google.com/). Really clever guys running that company.

Although as of late I find Yahoo getting me better results than google as everyone knows google's logic and they are bombing it to get their pages on top.

Supposedly yahoo has a bigger database now, but I just cant get over how cluttered their page feels. Usually if MS copies you it means you're doing something very right, and search.msn.com shows it.

114 posted on 10/06/2005 8:46:38 AM PDT by N3WBI3 (If SCO wants to go fishing they should buy a permit and find a lake like the rest of us..)
[ Post Reply | Private Reply | To 111 | View Replies]

To: Golden Eagle
Bottom line, without properly applied obscurity secrecy, encryption can't be effectively secure.

There, that's better. But then even secrecy isn't necessary, as you could generate a key from biometrics. Then there's no secrecy, only security (e.g., making sure no one forces you up to the retinal scanner).

Any encryption that relies on obscurity is doomed to fail. And unlike the secrecy of a key, which would compromise one person's communication, compromise of the system due to penetration of the obscurity would compromise everybody.

115 posted on 10/06/2005 8:48:35 AM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 112 | View Replies]

To: antiRepublicrat
But then even secrecy isn't necessary, as you could generate a key from biometrics.

Normal bunk. Then the digitized biometric key must be kept secret. You guys are beyond a joke.

116 posted on 10/06/2005 8:50:11 AM PDT by Golden Eagle
[ Post Reply | Private Reply | To 115 | View Replies]

To: antiRepublicrat
Remember when it was legal to export the book, but not the accompanying disk, even though the disk only contained what was listed in the book? ITAR's encryption controls produced some extremely strange and downright nonsensical results.

Oh, yes. They ended up printing the source code for PGP in book form in an OCR font (with barcode checksums) to get around the stupid export restrictions.

For a long time I had the "RSA in 3 Lines of Perl" signature on my emails. I figured every single message I sent ot the Cypherpunks mailing list was worth about 10000 years in a federal pen.

Sometimes FedGov is dumber than a bunch of rocks. (Actually, I figure most times FedGov is dumber than a bunch of rocks.)

117 posted on 10/06/2005 9:22:53 AM PDT by zeugma (Warning: Self-referential object does not reference itself.)
[ Post Reply | Private Reply | To 113 | View Replies]

To: antiRepublicrat
Any encryption that relies on obscurity is doomed to fail. And unlike the secrecy of a key, which would compromise one person's communication, compromise of the system due to penetration of the obscurity would compromise everybody.

Good point and well said.

BTW, referring back to my previous message, the department of commerce officially classified the following as a munition, subject to export restrictions:

     -export-a-crypto-system-sig -RSA-3-lines-PERL

#!/bin/perl -sp0777i<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<j]dsj
$/=unpack('H*',$_);$_=`echo 16dio\U$k"SK$/SM$n\EsN0p[lN*1
lK[d2%Sa2/d0$^Ixp"|dc`;s/\W//g;$_=pack('H*',/((..)*)$/)

118 posted on 10/06/2005 9:31:29 AM PDT by zeugma (Warning: Self-referential object does not reference itself.)
[ Post Reply | Private Reply | To 115 | View Replies]

To: Golden Eagle
Bottom line, without properly applied obscurity, encryption can't be effectively secure.

confidentiality != obscurity

My private encryption key is named secring.gpg and lives in ~/.gnupg

There you go, no obscurity. You know where it is and you know exactly what to look for. Now you can try to decrypt my encrypted communications.

Let me know how that works out for you.

119 posted on 10/06/2005 9:51:27 AM PDT by Knitebane (Happily Microsoft free since 1999.)
[ Post Reply | Private Reply | To 112 | View Replies]

To: Golden Eagle
Then the digitized biometric key must be kept secret.

Actually, no. If you normalize the biometrics to get the same end mathematical result every time, then the biometric itself can be the key. No stored digitized key necessary, you provide it every time you provide the biometric.

But you get a gold star for finally recognizing the difference between secrecy and obscurity. Your education continues...

120 posted on 10/06/2005 11:54:34 AM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 116 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 81-100101-120121-140 ... 341-353 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson