![]() Our tax dollars are still going to the our mutual safety so we should expect more. Our security as a whole is deficient, even if the TSA on its own might not be responsible for these two particular failures. While this is true, we can't allow that technicality to wipe the slate clean. I understand the point you are trying to make (re: enhanced security measures] but technically those two incidents had nothing to do with the TSA since they both flew from non-USA airports - that is, the TSA didn't screen them at all. ![]() 1) gaining access to the keys (DeCSS, playfair/hymn, JustePort) 2) Finding places in the software where the encryption is "off" or at least weaker than before (QTFairUse, and PyMusique). ![]() These kind of hacks involve on of two things. Once you have the private key, you can portray yourself as the iTunes client and away you go. In the case of AirTunes/JustePort, it's actually quite simple (for Jon and those of his talents), because the iTunes client software was the one encrypting the content for the AirPort, so the private key for that encryption was on the PC or Mac that was sending the content to the AirPort Express. I don't know how or even if Jon has cracked FairPlay 2.0 encryption. In case you've missed it, decryption is (once again) hacked QTFairUse6 () Explain how Jon from Norway has now for the second time managed to crack Apple's _encryption_ and nobody has yet found any way to crack the _decryption_?
0 Comments
Leave a Reply. |