Page 6 of 10 FirstFirst ... 2345678910 LastLast
Results 51 to 60 of 96

Thread: First pangolin hardware and software located in a datacenter (worlds first!)

  1. #51
    Join Date
    Apr 2010
    Location
    Grand Rapids, Mi
    Posts
    2,538

    Default

    SPEC has gotten to you!!

    Quote Originally Posted by dsli_jon View Post
    BRAINS!!!

    - Zombie
    leading in trailing technology

  2. #52
    Join Date
    Jan 2006
    Location
    Charleston, SC
    Posts
    2,147,489,554

    Exclamation

    Will you please make up your mind already? First you said:
    Quote Originally Posted by heroic View Post
    Pangolin can't afford to hire decent crypto dudes- they are *really* expensive.
    And then you said:
    Quote Originally Posted by heroic View Post
    Bzzzt! Wrong answer. Good cryptosystems don't cost money.
    So which is it? Does Pangolin need to spend a lot of money to get a decent encryption system, or can they go it alone (for free) by using public key cryptography?

    Bottom line: I'm sure they paid someone a good chunk of change for the encryption system they use on the LD-2000, because I asked Bill about it specifically. As to whether it's based on public-key cryptography or some other method I can't say - mostly because he didn't offer any details and I didn't ask for them. But the fact remains that the secure file format is still secure.

    Adam

  3. #53
    Join Date
    Jul 2010
    Location
    Netherlands
    Posts
    3,319

    Default

    Quote Originally Posted by buffo View Post
    Will you please make up your mind already? First you said:

    And then you said:

    So which is it? Does Pangolin need to spend a lot of money to get a decent encryption system, or can they go it alone (for free) by using public key cryptography?

    Bottom line: I'm sure they paid someone a good chunk of change for the encryption system they use on the LD-2000, because I asked Bill about it specifically. As to whether it's based on public-key cryptography or some other method I can't say - mostly because he didn't offer any details and I didn't ask for them. But the fact remains that the secure file format is still secure.

    Adam
    I'm sure Bill invested and spends a lot of money on the development of pangolin software and the security system works great .
    I dont know why this topic got off track so ensanly quick, but i'd apreciate it if we go back into the reason why I created this topic.
    It's a really great project and i'm very excited myself about the decision I took and also very happy that I took it.
    I expected rather a bit more comments that actually showed curiousity in the project itself and also more positive comments then all the immense amount of criticising comments about pangolin or me.

    Buffo your very very right with your responses and you know what you are talking about

    Best regards,

    Pieter
    Last edited by masterpj; 10-20-2011 at 05:17.

  4. #54
    mixedgas's Avatar
    mixedgas is online now Creaky Old Award Winning Bastard Technologist
    Infinitus Excellentia Ion Laser Dominatus
    Join Date
    May 2007
    Location
    A lab with some dripping water on the floor.
    Posts
    10,033

    Default

    PJ, I hate to burst your bubble, but I first saw a QM series product used as a remote device in a server some 10 years ago. QMs have ended up in some unique uses.

    Steve

  5. #55
    Join Date
    Jul 2010
    Location
    Netherlands
    Posts
    3,319

    Default

    Quote Originally Posted by mixedgas View Post
    PJ, I hate to burst your bubble, but I first saw a QM series product used as a remote device in a server some 10 years ago. QMs have ended up in some unique uses.

    Steve
    Was this server located in a datacenter?
    and was this server be used in a web application?

  6. #56
    mixedgas's Avatar
    mixedgas is online now Creaky Old Award Winning Bastard Technologist
    Infinitus Excellentia Ion Laser Dominatus
    Join Date
    May 2007
    Location
    A lab with some dripping water on the floor.
    Posts
    10,033

    Default

    If you consider a US LATA interexchange carrier's computer center a data center, which it is, yes. I actually watched the president of said company telnet into the server and pull me up some frames to Canada when the server was in the US.

    Steve

  7. #57
    Join Date
    Jul 2010
    Location
    Netherlands
    Posts
    3,319

    Default

    Quote Originally Posted by mixedgas View Post
    If you consider a US LATA interexchange carrier's computer center a data center, which it is, yes. I actually watched the president of said company telnet into the server and pull me up some frames to Canada when the server was in the US.

    Steve
    Telnet? omg thats really old.. but we are talking about http, php here
    and about a CLI (that hasn't been made before) So in use: we are the first

  8. #58
    Join Date
    May 2008
    Location
    nerdtown, USA
    Posts
    1,165

    Default

    Quote Originally Posted by buffo View Post
    Will you please make up your mind already?
    There are two kinds of good encryption: there's the open kind, that's secure because it is well known and has been inspected thoroughly, and there's the very expensive closed kind that even the military can't really afford (and, indeed, has turned out to be flawed on more than one occasion).

    The thing is, to prove a cryptosystem costs a lot of money- far more than Pangolin is ever going to spend on it- and you might still find a flaw after all that. I mean, DES turned out to be flawed, after all. You can either use a standard system in the knowledge that everyone else is using it and therefore it's had a lot of eyes on it, or you can use a closed system and hope that nobody tries looking too hard at it.

  9. #59
    Join Date
    Jan 2006
    Location
    Charleston, SC
    Posts
    2,147,489,554

    Default

    Or you can hire a cryptology expert to implement a standard system in your custom hardware. After all, even with the best standards in use, if you screw up the implementation, you're still compromised. Thus it pays to hire an expert even if you are using a standard system.

    While I can't say for certain, I strongly suspect that the people Bill hired to do the encryption probably did exactly this. And as I said before, the fact that it's withstood the test of time suggests that they did indeed do it right.

    Adam

  10. #60
    Join Date
    Oct 2010
    Location
    Silicon Valley
    Posts
    129

    Default

    Quote Originally Posted by masterpj View Post
    Telnet? omg thats really old.. but we are talking about http, php here
    and about a CLI (that hasn't been made before) So in use: we are the first
    So you're the first to have a box accessed through a CLI with "modern" tools.

    getting rather specific now?

    Craig

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •