Search results

  1. J

    Pretty Good Privacy (PGP)

    That's how the government reads your encrypted communication. They do not bother deciphering the content by cryptanalysis of the crypto algorithm for bulk of the people. The communication happens between the two end parties. But the secure session ends at the man-in-the-middle.
  2. J

    Pretty Good Privacy (PGP)

    The trick is the public key that you got from the server is not the public key of the person that you actually intended to communicate. You are actually talking to a gateway that acts as the man-in-the-middle and he gives his public key to you. The man-in-the middle gateway is able to get a fake...
  3. J

    Pretty Good Privacy (PGP)

    If the government decides to read or modify your email, they can - regardless of how strong encryption you use. If the public key is compromised, all bets are off. I work in a security company and one of the features our team recently developed will do the man-in-the-middle attack, regardless...
  4. J

    Kansas City wins Google's First 1Gbps internet

    The core routers (routers that are not dealing with the end user) are way way faster. It is the last mile (that's between the service provider to the subscriber) the weakest link.
  5. J

    Kansas City wins Google's First 1Gbps internet

    Google prefers a state that has the least computer usage to mask out their scalability issues. :devil:
Top