Coffeehouse Thread

57 posts

Forum Read Only

This forum has been made read only by the site admins. No new threads or comments can be added.

Conversation Locked

This conversation has been locked by the site admins. No new comments can be made.

Apparently the IPO didn't fund Linkedin enough to hire decent programmers

Back to Forum: Coffeehouse
  • User profile image
    01001001

    @blowdart:

    http://www.amazon.com/Barry-Dorrans/e/B004L59WF4/

    I won't be reading it unfortunately.

    I don't see what it has to do with LinkedIn either. LinkedIn doesn't use .NET and therefore, in my opinion, really has nothing to do with ASP.

    http://www.slideshare.net/linkedin/linkedins-communication-architecture

    If you look at the response header, you can see it uses Apache Coyote.

  • User profile image
    01001001

    Generic Forum Image

    Is this the new Microsoft?

    Windows 8 Rave, then when they're all high on extasy you tell them that Windows Server Clusters by failover and not actual load balancing of any kind?

  • User profile image
    AndyC

    , 01001001 wrote

    It doesn't matter what algorithm you use (short of a public/private key). As long as you have the salt, you can run a dictionary against the sums, MD5, SHA1, ect...

    The salt can be computed from the hash of one single username which you know the password to.

    Dictionary attacks can only suceed if your password is in the dictionary in questions. There are plenty of well known ways of securing passwords, it's really a shame we've done such a bad job of explaining them as opposed to pushing people in the direction of "complex" passwords full of numbers and symbols, which all too often rely on basic substitution techniques.

  • User profile image
    01001001

    The funny thing is that the real Beer developed a password encryption and security system for a major software vendor, and he doesn't have to write books explaining mundane ten year old tech to prove it. He takes his gratitude in cold hard cash.


    There is actually a form of authentication not requiring a RSA style public/private scheme you can implement which is unbreakable. But it's not cheap and it won't fall into the hands of GNU.

  • User profile image
    PaoloM

    , 01001001 wrote

    The funny thing is that the real Beer developed a password encryption and security system for a major software vendor, and he doesn't have to write books explaining mundane ten year old tech to prove it. He takes his gratitude in cold hard cash.

    How do you know? Did you ever met him?

    There is actually a form of authentication not requiring a RSA style public/private scheme you can implement which is unbreakable. But it's not cheap and it won't fall into the hands of GNU.

    We're listening. Douse us with your arcane knowledge.

  • User profile image
    01001001

    1 day ago, PaoloM wrote

    We're listening. Douse us with your arcane knowledge.

    If I put up a Visio or UML diagram detailing the technology and how it works, even if it is in fact unbreakable not through obfuscation.... How much would that technology be worth in dollar value after the posting?

    zero maybe?

    Even posting it to the USPTO would be a mistake, because somebody would just make a variant.

    Remember all those CD/DVD game protection schemes from Eastern Europe way back when that made people in Poland and other block countries overnight millionaires?

    How much would anything be worth if you explained it to people, even if the technology is 100% sound?

    How much would Goldman Sach's automated trading system be worth if a detailed technical overview was posted?

    Part of it's value is the fact that it's protected and a trade secret.

     

  • User profile image
    PaoloM

    Expressionless

  • User profile image
    Sven Groot

    So you're asking us to believe that you have invented authentication technology so good it's easily Turing Award material (based on your description). Technology that's better than all the cryptography experts in the world have managed to come up with. And you're asking us to do that based on absolutely zero evidence.

    Tell me if you ever find someone who believes you. I've got a bridge to sell them.

  • User profile image
    01001001

    You don't have to believe anything.

    http://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange

    There's a large difference between public/private key cryptography and internet passwords being stored as computed hashes for authentication comparison.

    People would like to think MD5 is one way encryption to compare passwords, but now that you can spin up a super computer on AWS in 5 minutes within registering, it's not a fantastic thing to be able to break even a well thought out password.

    http://www.scribd.com/doc/82701103/Analyst-Desktop-Binder-REDACTED

    Is your cryptography good enough to beat that? They're decrypting SSH transport in real time on a national basis. (again, they can do that because it's published and used as a standard)

    The little company I worked for had maybe a few tens of millions in budget, but the government has trillions. Think about what you can do if you put trillions of dollars on any given task.

    and yes, my mechanism, though I can't really say it's mine because I developed it for another company, is the shiznit...

  • User profile image
    PaoloM

    , 01001001 wrote

    ...

    and yes, my mechanism, though I can't really say it's mine because I developed it for another company, is the shiznit...

    *your* mechanism? I thought Beer was the inventor. Or are you talking about something else?

  • User profile image
    01001001

    something else entirely

  • User profile image
    PaoloM

    Of course Smiley

    Wait a second, what mechanism? When did you talk about it? This sounds like a plot hole...

  • User profile image
    ScanIAm

    , 01001001 wrote

    something else entirely

    "Hey, everybody, look at me!!!!"

  • User profile image
    Sven Groot

    , 01001001 wrote

    Is your cryptography good enough to beat that? They're decrypting SSH transport in real time on a national basis. (again, they can do that because it's published and used as a standard)

    If I'm reading this right, then this amazing password security thingy of yours is just using security through obscurity (you seem to believe it's somehow more secure because no one knows how the passwords are encrypted).

    Could you tell me what company this was developed for, so I know never to give them any of my passwords?

  • User profile image
    GoddersUK

    , 01001001 wrote

    *snip*

    If I put up a Visio or UML diagram detailing the technology and how it works, even if it is in fact unbreakable not through obfuscation.... How much would that technology be worth in dollar value after the posting?

    zero maybe?

    Even posting it to the USPTO would be a mistake, because somebody would just make a variant.

    Remember all those CD/DVD game protection schemes from Eastern Europe way back when that made people in Poland and other block countries overnight millionaires?

    How much would anything be worth if you explained it to people, even if the technology is 100% sound?

    How much would Goldman Sach's automated trading system be worth if a detailed technical overview was posted?

    Part of it's value is the fact that it's protected and a trade secret.

     

    Well show us the cash you've been making by selling this then.

     

  • User profile image
    Richard.Hein

    , Sven Groot wrote

    *snip*

    If I'm reading this right, then this amazing password security thingy of yours is just using security through obscurity (you seem to believe it's somehow more secure because no one knows how the passwords are encrypted).

    Could you tell me what company this was developed for, so I know never to give them any of my passwords?

    Just what I was thinking.  Yeah, he's full of it.  At the very least, you'd have a patent application if it was worth anything.  The only unbreakable schemes out there, in theory, are based on quantum cryptography.

  • User profile image
    Ray7

    , 01001001 wrote

    *snip*

    If I put up a Visio or UML diagram detailing the technology and how it works, even if it is in fact unbreakable not through obfuscation.... 

    Expressionless

    I think that is possibly the most outlandish claim I've ever read on the internet, and that's after reading a post from someone who claims he was punched in the neck by Jesus.

    Unbreakable? 

    Are you quite sure you wouldn't like to retract that?

  • User profile image
    ScanIAm

    , Ray7 wrote

    *snip*

    Expressionless

    I think that is possibly the most outlandish claim I've ever read on the internet, and that's after reading a post from someone who claims he was punched in the neck by Jesus.

    Unbreakable? 

    Are you quite sure you wouldn't like to retract that?

    It's a budhist koan:

    Generic Forum Image

Conversation locked

This conversation has been locked by the site admins. No new comments can be made.