@Slinkytech: Uh, the air force does. Anybody in the air force with the clearance and a reason to, can view those documents. They're still classified, so they just have to go through proper channels and do it on a secured computer.
@Slinkytech: Uh, the air force does. Anybody in the air force with the clearance and a reason to, can view those documents. They're still classified, so they just have to go through proper channels and do it on a secured computer.
@holy holes batman: Then they're doing a fucking shitty job of it.
@piratekingtim: Nothing. Unless you have any evidence to the contrary, whatsoever.
In other news, the US military is a giant bureaucracy and like all bureaucracies it tends to stubbornly follow the rules, even when the rules are stupid.
@vinod1978: Does it have a nifty feature where the NSA has audited it and added their own security and cryptography infrastructure?
Given the potential size of such a program, I'd half expect them to go to Motorola or some other US company and have them build a handset and a custom DoD version of Android (with extra security goodness).
@FriedPeeps will kill for a CR-48: Or more realistically, "John, we need you. Nobody knows how to calibrate the mass spectrometer and we lost the manual."
@Brownski: Uh, that more or less follows US population density.
@MercerCh00x: That seems like a bad idea. Tossing an axe into a fire to burn off the wood will soften the metal, unless you quench it.
Edit: Gah, doublepost.
Makes sense, but a pain in the ass if you want to multiply numbers with large digits, e.g., 999 x 999 :).
@PixieKat: Yes, they used a very weak hash, and they didn't salt it. That was foolish.
@turwaith: Sure you can. And an encryption algorithm can be used as a hash.
@PixieKat: No, you're a fool for ranting about something while not making the trivial effort to confirm that you aren't completely wrong.
@turwaith: They already were. If your password was compromised, you were using a stupidly trivial password and it got brute forced.
@PixieKat: Uh, no. If you actually look at the leaked account information before spouting off at the mouth/keyboard, you'll notice that the passwords were hashed.
Suggestion to people who got burned over this leak: KeePass or something similar. If you use multiple computers, there are a number of transparent synchronization services (like Windows Mesh or Dropbox) that will keep your password file up to date on all systems you use.
@CaptainJack: The area enclosed by a curve in the complex plane is the sum of the residues at the poles contained within the curve.
@ScaryMerry: I don't agree. A laptop with the same dimensions as the Cr-48, but with the hard edges and corners of a classic thinkpad would be fantastic, in my opinion.
@Barada_nikto_byotch: Yeah, that's one of my favorite movies of the past decade.