jepzilla-old
jepzilla
jepzilla-old

@Slinkytech: Uh, the air force does. Anybody in the air force with the clearance and a reason to, can view those documents. They're still classified, so they just have to go through proper channels and do it on a secured computer.

@piratekingtim: Nothing. Unless you have any evidence to the contrary, whatsoever.

In other news, the US military is a giant bureaucracy and like all bureaucracies it tends to stubbornly follow the rules, even when the rules are stupid.

@vinod1978: Does it have a nifty feature where the NSA has audited it and added their own security and cryptography infrastructure?

Given the potential size of such a program, I'd half expect them to go to Motorola or some other US company and have them build a handset and a custom DoD version of Android (with extra security goodness).

@FriedPeeps will kill for a CR-48: Or more realistically, "John, we need you. Nobody knows how to calibrate the mass spectrometer and we lost the manual."

@Brownski: Uh, that more or less follows US population density.

@MercerCh00x: That seems like a bad idea. Tossing an axe into a fire to burn off the wood will soften the metal, unless you quench it.

Edit: Gah, doublepost.

Makes sense, but a pain in the ass if you want to multiply numbers with large digits, e.g., 999 x 999 :).

@PixieKat: Yes, they used a very weak hash, and they didn't salt it. That was foolish.

@turwaith: Sure you can. And an encryption algorithm can be used as a hash.

@PixieKat: No, you're a fool for ranting about something while not making the trivial effort to confirm that you aren't completely wrong.

@turwaith: They already were. If your password was compromised, you were using a stupidly trivial password and it got brute forced.

@PixieKat: Uh, no. If you actually look at the leaked account information before spouting off at the mouth/keyboard, you'll notice that the passwords were hashed.

Suggestion to people who got burned over this leak: KeePass or something similar. If you use multiple computers, there are a number of transparent synchronization services (like Windows Mesh or Dropbox) that will keep your password file up to date on all systems you use.

@CaptainJack: The area enclosed by a curve in the complex plane is the sum of the residues at the poles contained within the curve.

@ScaryMerry: I don't agree. A laptop with the same dimensions as the Cr-48, but with the hard edges and corners of a classic thinkpad would be fantastic, in my opinion.