Skip to main content

We were very careful: we did n...

We were very careful: we did not intercept any traffic, we did not sniff any networks ... We went to databases that contained public information and downloaded public keys.

16 quotes

Their secret keys are accessib...

Their secret keys are accessible to anyone who takes the trouble to redo our work. ... 1024-bit RSA provides 99.8 percent security at best.

16 quotes

The fact is, if these numbers ...

The fact is, if these numbers had the entropy that they were supposed to have, the probability of even one of these events happening in 7 million public keys would be vanishingly small.

16 quotes

We're currently working around...

We're currently working around the clock to get notifications to all of the parties that are affected by this.

16 quotes

The lack of sophistication of ...

The lack of sophistication of our methods and findings make it hard for us to believe that what we have presented is new, in particular to agencies and parties that are known for their curiosity in such matters.

16 quotes

Our only conclusion is that th...

Our only conclusion is that there is not just one cause for all of these problems ... This leads to our conclusion that unless you can totally trust your random number generator, RSA is not a good algorithm to choose.

16 quotes

If you have a collision, you o...

If you have a collision, you only affect one other person. You can hurt them and they can hurt you, but you haven't made it public to everybody and their mother.

16 quotes

Embedded devices have a histor...

Embedded devices have a history of problems in generating entropy for keys ... We're seeing the same embedded devices from the same manufacturer generating the same primes.

16 quotes

I hate to say it but this does...

I hate to say it but this does have implications for web-based commerce because people can mount man-in-the-middle attacks.

16 quotes

If you can programme events at...

If you can programme events at a molecular level in cells, you can cure or kill cells which are sick or in trouble and leave the other ones intact. You cannot do this with electronics.

16 quotes

We build the template in the f...

We build the template in the form of synthetic genes and the cell turns them into components ... So we are hijacking the pathway that already exists.

16 quotes

You could have a model of a DN...

You could have a model of a DNA circuit written in DSD, which interfaces with a model of the cell machinery written in GEC.

16 quotes

История в фотографиях (68)

128

Владимир Высоцкий за рулем своего Mercedes 450. Ума Турман, 1986 год. Джек Николсон в тестовом гриме для фильма "Иствикские ведьмы", 1987 год....

История в фотографиях (67)

201

«Титаник» покидает гавань и выходит в Кельтское море. Последняя фотография лайнера над водой. 10.04.1912 г. Сибирячка и зашедшие в гости медвежата, 1900 г. Заброшенный парк президентов, штат Вирджиния...

История в фотографиях (66)

234

Автомобиль скорой помощи. США, 1967 год. 1971 Buick Riviera GS. Лив Тайлер на съёмках фильма "Онегин", 1998 год. Одри Хепберн и ее ручной олененок, 1958 год....

История в фотографиях (65)

297

Шведская супермодель Лиза Фонсангривс на Эйфелевой башне. Фото Erwin Blumenfeld. Париж, Франция 1939г. Ю. Никулин с семьей на отдыхе, СССР, 1970–е. Моргaн Фримен во время службы в армии США, 1955 год....

История в фотографиях (64)

321

Первая Всемирная выставка ХХ века. Париж. Франция. 1900г. Павильон СССР на Всемирной технологической выставке EXPO-70, Осака 1970 год. ...