<article>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#article09_11_18_2149202</id>
	<title>US Government Using PS3s To Break Encryption</title>
	<author>timothy</author>
	<datestamp>1258539360000</datestamp>
	<htmltext>Entropy98 writes <i>"It seems that the US Immigration and Customs Enforcement Cyber Crimes Center, known as C3, has <a href="http://www.axcessnews.com/index.php/articles/show/id/19037?31">replaced its '$8,000 Tableau/Dell server combination'</a> with <a href="http://www.gamespot.com/news/6240562.html">more efficient and much cheaper $300 PS3s</a>. Each PS3 is capable of 4 million passwords per second, and C3 currently has 20 PS3s with plans to buy 40 more. Naturally this is only being used to break encryption on computers seized with a warrant and suspected of harboring child pornography."</i></htmltext>
<tokenext>Entropy98 writes " It seems that the US Immigration and Customs Enforcement Cyber Crimes Center , known as C3 , has replaced its ' $ 8,000 Tableau/Dell server combination ' with more efficient and much cheaper $ 300 PS3s .
Each PS3 is capable of 4 million passwords per second , and C3 currently has 20 PS3s with plans to buy 40 more .
Naturally this is only being used to break encryption on computers seized with a warrant and suspected of harboring child pornography .
"</tokentext>
<sentencetext>Entropy98 writes "It seems that the US Immigration and Customs Enforcement Cyber Crimes Center, known as C3, has replaced its '$8,000 Tableau/Dell server combination' with more efficient and much cheaper $300 PS3s.
Each PS3 is capable of 4 million passwords per second, and C3 currently has 20 PS3s with plans to buy 40 more.
Naturally this is only being used to break encryption on computers seized with a warrant and suspected of harboring child pornography.
"</sentencetext>
</article>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151756</id>
	<title>Re:Let this be a lesson to you</title>
	<author>Anonymous</author>
	<datestamp>1257085500000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>the source is available, so yes it is open source.</p></htmltext>
<tokenext>the source is available , so yes it is open source .</tokentext>
<sentencetext>the source is available, so yes it is open source.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150058</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152722</id>
	<title>Re:How does this work?</title>
	<author>Anonymous</author>
	<datestamp>1257093780000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Passwords are usually stored as hashes, and there has to be some kind of hash stored somewhere where the program can access it.</p></htmltext>
<tokenext>Passwords are usually stored as hashes , and there has to be some kind of hash stored somewhere where the program can access it .</tokentext>
<sentencetext>Passwords are usually stored as hashes, and there has to be some kind of hash stored somewhere where the program can access it.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150456</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149880</id>
	<title>Yeah right</title>
	<author>JavaBear</author>
	<datestamp>1257075660000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>" Naturally this is only being used to break encryption on computers seized with a warrant and suspected of harboring child pornography."</p><p>You know,  if you buy that one, I have this little red bridge I'd like to sell you.</p></htmltext>
<tokenext>" Naturally this is only being used to break encryption on computers seized with a warrant and suspected of harboring child pornography .
" You know , if you buy that one , I have this little red bridge I 'd like to sell you .</tokentext>
<sentencetext>" Naturally this is only being used to break encryption on computers seized with a warrant and suspected of harboring child pornography.
"You know,  if you buy that one, I have this little red bridge I'd like to sell you.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151068</id>
	<title>Re:And the problem with this is???</title>
	<author>stephanruby</author>
	<datestamp>1257081300000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>If someone was really being suspected of doing child porn or viewing child porn, shouldn't this be under some other Federal agency's purview? Personally, the cynic in me believes they're doing this through the US Immigration and Customs Enforcement agency precisely because Immigration and Customs is a special case and they can probably bend the rules of the constitution a little through that agency (just like they did, when they arrested the ACLU guy and tried to enforce the IRS regulations on him under the guise of passenger safety/counter terrorism).</htmltext>
<tokenext>If someone was really being suspected of doing child porn or viewing child porn , should n't this be under some other Federal agency 's purview ?
Personally , the cynic in me believes they 're doing this through the US Immigration and Customs Enforcement agency precisely because Immigration and Customs is a special case and they can probably bend the rules of the constitution a little through that agency ( just like they did , when they arrested the ACLU guy and tried to enforce the IRS regulations on him under the guise of passenger safety/counter terrorism ) .</tokentext>
<sentencetext>If someone was really being suspected of doing child porn or viewing child porn, shouldn't this be under some other Federal agency's purview?
Personally, the cynic in me believes they're doing this through the US Immigration and Customs Enforcement agency precisely because Immigration and Customs is a special case and they can probably bend the rules of the constitution a little through that agency (just like they did, when they arrested the ACLU guy and tried to enforce the IRS regulations on him under the guise of passenger safety/counter terrorism).</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149794</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152442</id>
	<title>Re:What</title>
	<author>Anonymous</author>
	<datestamp>1257090540000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>If you have Enterprise or Ultimate, BitLocker is perfect.  You can have your external HDDs and USB flash drives have a password, and have the machine recognize and auto unlock the drive when it is mounted.</p><p>If you have a machine with a usable TPM, and a top of the line W7 edition, I'd go with BitLocker.  If not, I'd go with TrueCrypt.  In both cases, I'd have TrueCrypt installed for partition level encryption (so I can have one client's project in one container, another project in another, and only mount what is needed at the time.)  If you have a TPM, the fact that someone wouldn't be able to replace the MBR or other boot sectors with ones that might stash your passphrase for later retrieval adds good security.</p></htmltext>
<tokenext>If you have Enterprise or Ultimate , BitLocker is perfect .
You can have your external HDDs and USB flash drives have a password , and have the machine recognize and auto unlock the drive when it is mounted.If you have a machine with a usable TPM , and a top of the line W7 edition , I 'd go with BitLocker .
If not , I 'd go with TrueCrypt .
In both cases , I 'd have TrueCrypt installed for partition level encryption ( so I can have one client 's project in one container , another project in another , and only mount what is needed at the time .
) If you have a TPM , the fact that someone would n't be able to replace the MBR or other boot sectors with ones that might stash your passphrase for later retrieval adds good security .</tokentext>
<sentencetext>If you have Enterprise or Ultimate, BitLocker is perfect.
You can have your external HDDs and USB flash drives have a password, and have the machine recognize and auto unlock the drive when it is mounted.If you have a machine with a usable TPM, and a top of the line W7 edition, I'd go with BitLocker.
If not, I'd go with TrueCrypt.
In both cases, I'd have TrueCrypt installed for partition level encryption (so I can have one client's project in one container, another project in another, and only mount what is needed at the time.
)  If you have a TPM, the fact that someone wouldn't be able to replace the MBR or other boot sectors with ones that might stash your passphrase for later retrieval adds good security.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149804</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150058</id>
	<title>Let this be a lesson to you</title>
	<author>CSFFlame</author>
	<datestamp>1257076260000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Use long passwords for encryption (minimum 10 chars, preferably 20).
Use upper-case, lower-case, numbers, and symbols.
Do NOT use the password anywhere else or write it down.  Sorry, but you're going to have to commit it to memory.

Do not use windows built in encryption or any retail encryption schemes.  Use open source.

Truecrypt is not open source, but people use it anyway, so read up first before you decide.</htmltext>
<tokenext>Use long passwords for encryption ( minimum 10 chars , preferably 20 ) .
Use upper-case , lower-case , numbers , and symbols .
Do NOT use the password anywhere else or write it down .
Sorry , but you 're going to have to commit it to memory .
Do not use windows built in encryption or any retail encryption schemes .
Use open source .
Truecrypt is not open source , but people use it anyway , so read up first before you decide .</tokentext>
<sentencetext>Use long passwords for encryption (minimum 10 chars, preferably 20).
Use upper-case, lower-case, numbers, and symbols.
Do NOT use the password anywhere else or write it down.
Sorry, but you're going to have to commit it to memory.
Do not use windows built in encryption or any retail encryption schemes.
Use open source.
Truecrypt is not open source, but people use it anyway, so read up first before you decide.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149722</id>
	<title>Re:Right idea, poor execution</title>
	<author>Anonymous</author>
	<datestamp>1257075000000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>memory does not <em>servers</em></p></htmltext>
<tokenext>memory does not servers</tokentext>
<sentencetext>memory does not servers</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149604</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151944</id>
	<title>Re:4 million passwords? Umm, no.</title>
	<author>ceoyoyo</author>
	<datestamp>1257087000000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>"4MFLOPS seems much more likely."</p><p>For a PS1 maybe.</p></htmltext>
<tokenext>" 4MFLOPS seems much more likely .
" For a PS1 maybe .</tokentext>
<sentencetext>"4MFLOPS seems much more likely.
"For a PS1 maybe.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150076</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151340</id>
	<title>Re:Nit-picking the article</title>
	<author>selven</author>
	<datestamp>1257082860000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>But even if 99\% of crooks are smart crooks it's a much better deal to catch 1\% of them with 0.1\% of the effort by sticking to alphanumeric.</p></htmltext>
<tokenext>But even if 99 \ % of crooks are smart crooks it 's a much better deal to catch 1 \ % of them with 0.1 \ % of the effort by sticking to alphanumeric .</tokentext>
<sentencetext>But even if 99\% of crooks are smart crooks it's a much better deal to catch 1\% of them with 0.1\% of the effort by sticking to alphanumeric.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150030</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152732</id>
	<title>Re:Nice move Sony</title>
	<author>mindstrm</author>
	<datestamp>1257093780000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>They left it in as a hobbyist thing.</p><p>They probably didn't expect people to buy them en-masse to build huge clusters - that's a losing proposition for sony, as PS3's are sold below cost as a loss-leader assuming they will make up the money on game sales.</p></htmltext>
<tokenext>They left it in as a hobbyist thing.They probably did n't expect people to buy them en-masse to build huge clusters - that 's a losing proposition for sony , as PS3 's are sold below cost as a loss-leader assuming they will make up the money on game sales .</tokentext>
<sentencetext>They left it in as a hobbyist thing.They probably didn't expect people to buy them en-masse to build huge clusters - that's a losing proposition for sony, as PS3's are sold below cost as a loss-leader assuming they will make up the money on game sales.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149566</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30169118</id>
	<title>Re:Nit-picking the article</title>
	<author>Anonymous</author>
	<datestamp>1258711560000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>My  friends and I called that "pseudospace" back in the day, cause it looked like a space!</p><p>But it wasn't!</p></htmltext>
<tokenext>My friends and I called that " pseudospace " back in the day , cause it looked like a space ! But it was n't !</tokentext>
<sentencetext>My  friends and I called that "pseudospace" back in the day, cause it looked like a space!But it wasn't!</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150030</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150068</id>
	<title>What is known</title>
	<author>AHuxley</author>
	<datestamp>1257076320000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><a href="http://afp.google.com/article/ALeqM5itMBF-kPRgoyoD97Y\_DtvcyItGSQ" title="google.com">http://afp.google.com/article/ALeqM5itMBF-kPRgoyoD97Y\_DtvcyItGSQ</a> [google.com] <br>
FARC data was opened after <br>
"It took Interpol two weeks running 10 computers simultaneously 24 hours a day to break into the encrypted files, the agency said." in 2008.<br>
C3 seems to be funded with extra millions so whats missing with this story?<br>
Why buy toys?  Toys have cheap bottlenecks as "Halo" at 620p showed.<br>
Sony PR, a cry for funding and power ?  Why this dependance on Sony suburban plastic?<br>
If federal agents find more PS3's via forfeiture laws, this might allow a super grid of units?<br>
Also shows how good MS and archive encryption is<nobr> <wbr></nobr>:) <br>
Real world numbers:)</htmltext>
<tokenext>http : //afp.google.com/article/ALeqM5itMBF-kPRgoyoD97Y \ _DtvcyItGSQ [ google.com ] FARC data was opened after " It took Interpol two weeks running 10 computers simultaneously 24 hours a day to break into the encrypted files , the agency said .
" in 2008 .
C3 seems to be funded with extra millions so whats missing with this story ?
Why buy toys ?
Toys have cheap bottlenecks as " Halo " at 620p showed .
Sony PR , a cry for funding and power ?
Why this dependance on Sony suburban plastic ?
If federal agents find more PS3 's via forfeiture laws , this might allow a super grid of units ?
Also shows how good MS and archive encryption is : ) Real world numbers : )</tokentext>
<sentencetext>http://afp.google.com/article/ALeqM5itMBF-kPRgoyoD97Y\_DtvcyItGSQ [google.com] 
FARC data was opened after 
"It took Interpol two weeks running 10 computers simultaneously 24 hours a day to break into the encrypted files, the agency said.
" in 2008.
C3 seems to be funded with extra millions so whats missing with this story?
Why buy toys?
Toys have cheap bottlenecks as "Halo" at 620p showed.
Sony PR, a cry for funding and power ?
Why this dependance on Sony suburban plastic?
If federal agents find more PS3's via forfeiture laws, this might allow a super grid of units?
Also shows how good MS and archive encryption is :) 
Real world numbers:)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150456</id>
	<title>How does this work?</title>
	<author>AP31R0N</author>
	<datestamp>1257078000000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext><p>Seems to me that a reasonably well designed OS would lock after 4 password attempts.  How are they entering all these passwords w/o the system balking?</p><p>i'm asking because i don't know, please don't mod me a troll for not knowing something.</p></htmltext>
<tokenext>Seems to me that a reasonably well designed OS would lock after 4 password attempts .
How are they entering all these passwords w/o the system balking ? i 'm asking because i do n't know , please do n't mod me a troll for not knowing something .</tokentext>
<sentencetext>Seems to me that a reasonably well designed OS would lock after 4 password attempts.
How are they entering all these passwords w/o the system balking?i'm asking because i don't know, please don't mod me a troll for not knowing something.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150030</id>
	<title>Re:Nit-picking the article</title>
	<author>Wonko the Sane</author>
	<datestamp>1257076140000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>4</modscore>
	<htmltext><blockquote><div><p>Um, only if the person uses characters that can't be typed on a normal keyboard.</p></div></blockquote><p>If the smart crooks are using any version of Windows then they can access all extended characters from their normal keyboard by holding down the ALT key and typing the character code on the numeric keypad.</p><p>I used character 255 back in the Windows 3.1 days to make directories that no one else could figure out how to get in to. (DOS had no problem but windows couldn't handle a file with that character  in the name)</p></div>
	</htmltext>
<tokenext>Um , only if the person uses characters that ca n't be typed on a normal keyboard.If the smart crooks are using any version of Windows then they can access all extended characters from their normal keyboard by holding down the ALT key and typing the character code on the numeric keypad.I used character 255 back in the Windows 3.1 days to make directories that no one else could figure out how to get in to .
( DOS had no problem but windows could n't handle a file with that character in the name )</tokentext>
<sentencetext>Um, only if the person uses characters that can't be typed on a normal keyboard.If the smart crooks are using any version of Windows then they can access all extended characters from their normal keyboard by holding down the ALT key and typing the character code on the numeric keypad.I used character 255 back in the Windows 3.1 days to make directories that no one else could figure out how to get in to.
(DOS had no problem but windows couldn't handle a file with that character  in the name)
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149718</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30165210</id>
	<title>Re:Hmmmm</title>
	<author>ediron2</author>
	<datestamp>1258631280000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><blockquote><div><p>So I ask the<nobr> <wbr></nobr>/. crowd are there any good alternatives to passwords that are feasible?</p></div> </blockquote><p>Yes.</p><blockquote><div><p>Something secure. Something that can be implemented on websites. What do you think we should be working towards?</p></div> </blockquote><p>Yes.</p><blockquote><div><p>Is there already something in place that you can give an example of?</p></div></blockquote><p>Yes.</p><p>This gets covered twice a month or more on<nobr> <wbr></nobr>/., plus countless trade and general-interest articles... Do you really expect us to drag your sorry ass up the hill teaching you security 101 when you've apparently been intentionally blase and ignorant until this very moment?  Grab a clue, grab a book on security, or google up password security.  Learn about the three factors that can be used to create 2-factor sets, learn about signatures and authority.  Or, at the least, read anything you find on advice for creating better passwords.  Pass phrases, for starters.  Follow that advice and shoot for a mix of letters, numbers and symbols/gibberish characters that is more than 15 characters long.  Have a plan to cope with forgetfulness (in other words, write the passwords on a piece of paper you keep in sock drawer or somewhere else private)... aw, shit, and suddenly I am sucked into this copypasta-smelling idiotic request for obvious information.</p><p>Better yet, give everything to charity and then nobody'll want your freakin' passwords.</p></div>
	</htmltext>
<tokenext>So I ask the / .
crowd are there any good alternatives to passwords that are feasible ?
Yes.Something secure .
Something that can be implemented on websites .
What do you think we should be working towards ?
Yes.Is there already something in place that you can give an example of ? Yes.This gets covered twice a month or more on /. , plus countless trade and general-interest articles... Do you really expect us to drag your sorry ass up the hill teaching you security 101 when you 've apparently been intentionally blase and ignorant until this very moment ?
Grab a clue , grab a book on security , or google up password security .
Learn about the three factors that can be used to create 2-factor sets , learn about signatures and authority .
Or , at the least , read anything you find on advice for creating better passwords .
Pass phrases , for starters .
Follow that advice and shoot for a mix of letters , numbers and symbols/gibberish characters that is more than 15 characters long .
Have a plan to cope with forgetfulness ( in other words , write the passwords on a piece of paper you keep in sock drawer or somewhere else private ) ... aw , shit , and suddenly I am sucked into this copypasta-smelling idiotic request for obvious information.Better yet , give everything to charity and then nobody 'll want your freakin ' passwords .</tokentext>
<sentencetext>So I ask the /.
crowd are there any good alternatives to passwords that are feasible?
Yes.Something secure.
Something that can be implemented on websites.
What do you think we should be working towards?
Yes.Is there already something in place that you can give an example of?Yes.This gets covered twice a month or more on /., plus countless trade and general-interest articles... Do you really expect us to drag your sorry ass up the hill teaching you security 101 when you've apparently been intentionally blase and ignorant until this very moment?
Grab a clue, grab a book on security, or google up password security.
Learn about the three factors that can be used to create 2-factor sets, learn about signatures and authority.
Or, at the least, read anything you find on advice for creating better passwords.
Pass phrases, for starters.
Follow that advice and shoot for a mix of letters, numbers and symbols/gibberish characters that is more than 15 characters long.
Have a plan to cope with forgetfulness (in other words, write the passwords on a piece of paper you keep in sock drawer or somewhere else private)... aw, shit, and suddenly I am sucked into this copypasta-smelling idiotic request for obvious information.Better yet, give everything to charity and then nobody'll want your freakin' passwords.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150566</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150112</id>
	<title>keys or passwords?</title>
	<author>flyhigher</author>
	<datestamp>1257076440000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>It sounds like they are guessing passwords rather than cracking keys.  But is there any advantage in using a CELL processor for this?</p><p>AES, for example, is the encryption standard used by PGP's whole disk encryption.  From<br><a href="http://en.wikipedia.org/wiki/Brute\_force\_attack" title="wikipedia.org" rel="nofollow">http://en.wikipedia.org/wiki/Brute\_force\_attack</a> [wikipedia.org]:</p><p>"AES permits the use of 256-bit keys. Breaking a symmetric 256-bit key by brute force requires 2128 times more computational power than a 128-bit key. A device that could check a billion billion (1018) AES keys per second would require about 3&#215;1051 years to exhaust the 256-bit key space."</p><p>Hence my thought that they are not cracking keys.</p></htmltext>
<tokenext>It sounds like they are guessing passwords rather than cracking keys .
But is there any advantage in using a CELL processor for this ? AES , for example , is the encryption standard used by PGP 's whole disk encryption .
Fromhttp : //en.wikipedia.org/wiki/Brute \ _force \ _attack [ wikipedia.org ] : " AES permits the use of 256-bit keys .
Breaking a symmetric 256-bit key by brute force requires 2128 times more computational power than a 128-bit key .
A device that could check a billion billion ( 1018 ) AES keys per second would require about 3   1051 years to exhaust the 256-bit key space .
" Hence my thought that they are not cracking keys .</tokentext>
<sentencetext>It sounds like they are guessing passwords rather than cracking keys.
But is there any advantage in using a CELL processor for this?AES, for example, is the encryption standard used by PGP's whole disk encryption.
Fromhttp://en.wikipedia.org/wiki/Brute\_force\_attack [wikipedia.org]:"AES permits the use of 256-bit keys.
Breaking a symmetric 256-bit key by brute force requires 2128 times more computational power than a 128-bit key.
A device that could check a billion billion (1018) AES keys per second would require about 3×1051 years to exhaust the 256-bit key space.
"Hence my thought that they are not cracking keys.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30168894</id>
	<title>Why isn't anyone mentioning the kicker?</title>
	<author>Phil Urich</author>
	<datestamp>1258750500000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><blockquote><div><p>However, C3 must use pre-PS3 Slim units, as new restrictions introduced with the latest iteration of the console prevent the agency from installing the open-source operating system.</p></div></blockquote><p>

I mean, really, on such a tech-y I'm surprised more people aren't annoyed by Sony's thinly-rationalized retroactive lockout of other OSes!  (Personally, it's the reason why I've gone from "yeah, I should definitely pick up a PS3" to "hmm, maybe if I run into a used one I'll buy it, I guess.")  It's also interesting that even the U.S. government is locked out of such hardware when a company like Sony decides to restrict "homebrew" uses.  There's a lot more to be said on that issue . . .</p></div>
	</htmltext>
<tokenext>However , C3 must use pre-PS3 Slim units , as new restrictions introduced with the latest iteration of the console prevent the agency from installing the open-source operating system .
I mean , really , on such a tech-y I 'm surprised more people are n't annoyed by Sony 's thinly-rationalized retroactive lockout of other OSes !
( Personally , it 's the reason why I 've gone from " yeah , I should definitely pick up a PS3 " to " hmm , maybe if I run into a used one I 'll buy it , I guess .
" ) It 's also interesting that even the U.S. government is locked out of such hardware when a company like Sony decides to restrict " homebrew " uses .
There 's a lot more to be said on that issue .
. .</tokentext>
<sentencetext>However, C3 must use pre-PS3 Slim units, as new restrictions introduced with the latest iteration of the console prevent the agency from installing the open-source operating system.
I mean, really, on such a tech-y I'm surprised more people aren't annoyed by Sony's thinly-rationalized retroactive lockout of other OSes!
(Personally, it's the reason why I've gone from "yeah, I should definitely pick up a PS3" to "hmm, maybe if I run into a used one I'll buy it, I guess.
")  It's also interesting that even the U.S. government is locked out of such hardware when a company like Sony decides to restrict "homebrew" uses.
There's a lot more to be said on that issue .
. .
	</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150318</id>
	<title>Re:I see a trend here</title>
	<author>cmiller173</author>
	<datestamp>1257077340000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Back before I changed majors from Nuclear Engineering (1986 ish) I wrote a reactor core sims on my Apple<nobr> <wbr></nobr>//e.

Admittedly it took a few hours to run and was a fairly basic simulation but....</htmltext>
<tokenext>Back before I changed majors from Nuclear Engineering ( 1986 ish ) I wrote a reactor core sims on my Apple //e .
Admittedly it took a few hours to run and was a fairly basic simulation but... .</tokentext>
<sentencetext>Back before I changed majors from Nuclear Engineering (1986 ish) I wrote a reactor core sims on my Apple //e.
Admittedly it took a few hours to run and was a fairly basic simulation but....</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149576</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30154052</id>
	<title>Re:How does this work?</title>
	<author>Anonymous</author>
	<datestamp>1258624920000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>For example they sniff a hash of your password and can therefore crack it offline.</p></htmltext>
<tokenext>For example they sniff a hash of your password and can therefore crack it offline .</tokentext>
<sentencetext>For example they sniff a hash of your password and can therefore crack it offline.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150456</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152450</id>
	<title>I have a 256 character binary password.....</title>
	<author>KPexEA</author>
	<datestamp>1257090660000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I have a custom password entry box whereby I enter a filename, offset and length and then it grabs the password from inside of the file at the offset and length I specified. The filename can by ANY file on the whole machine (or on removeable media like a USB key).</htmltext>
<tokenext>I have a custom password entry box whereby I enter a filename , offset and length and then it grabs the password from inside of the file at the offset and length I specified .
The filename can by ANY file on the whole machine ( or on removeable media like a USB key ) .</tokentext>
<sentencetext>I have a custom password entry box whereby I enter a filename, offset and length and then it grabs the password from inside of the file at the offset and length I specified.
The filename can by ANY file on the whole machine (or on removeable media like a USB key).</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150768</id>
	<title>Re:How does this work?</title>
	<author>The -e**(i*pi)</author>
	<datestamp>1257079680000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>The OS stores a hash of the password on the hard drive.<br>When you log, in the OS calculates the hash of the password you typed and compares it to the one saved on the disk.</p></htmltext>
<tokenext>The OS stores a hash of the password on the hard drive.When you log , in the OS calculates the hash of the password you typed and compares it to the one saved on the disk .</tokentext>
<sentencetext>The OS stores a hash of the password on the hard drive.When you log, in the OS calculates the hash of the password you typed and compares it to the one saved on the disk.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150456</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150984</id>
	<title>Re:Nit-picking the article</title>
	<author>Anonymous</author>
	<datestamp>1257080880000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Maybe the real smart crooks do encrypt their stuff with something the requires just less than banging them over the head with a $5 pipe will reveal, you know to avoid being banged over the head with a $5 pipe.</p></htmltext>
<tokenext>Maybe the real smart crooks do encrypt their stuff with something the requires just less than banging them over the head with a $ 5 pipe will reveal , you know to avoid being banged over the head with a $ 5 pipe .</tokentext>
<sentencetext>Maybe the real smart crooks do encrypt their stuff with something the requires just less than banging them over the head with a $5 pipe will reveal, you know to avoid being banged over the head with a $5 pipe.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149718</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150560</id>
	<title>Re:Nit-picking the article</title>
	<author>PitaBred</author>
	<datestamp>1257078540000</datestamp>
	<modclass>Funny</modclass>
	<modscore>2</modscore>
	<htmltext>Bang them over the head? I'd go for the kneecaps and extremities. Hitting someone over the head to get knowledge out of said head seems a little foolish...</htmltext>
<tokenext>Bang them over the head ?
I 'd go for the kneecaps and extremities .
Hitting someone over the head to get knowledge out of said head seems a little foolish.. .</tokentext>
<sentencetext>Bang them over the head?
I'd go for the kneecaps and extremities.
Hitting someone over the head to get knowledge out of said head seems a little foolish...</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149718</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149866</id>
	<title>Re:Right idea, poor execution</title>
	<author>Anonymous</author>
	<datestamp>1257075600000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>It allows you to use 6 SPEs at 3.2 GHz, for around 150GFlops throughput at $300 for the whole system. If your algorithm is suited for Cell you won'te even come close to that efficiency using PC hardware. (And IBM's Cell servers are around 15 times more expensive)</p></htmltext>
<tokenext>It allows you to use 6 SPEs at 3.2 GHz , for around 150GFlops throughput at $ 300 for the whole system .
If your algorithm is suited for Cell you won'te even come close to that efficiency using PC hardware .
( And IBM 's Cell servers are around 15 times more expensive )</tokentext>
<sentencetext>It allows you to use 6 SPEs at 3.2 GHz, for around 150GFlops throughput at $300 for the whole system.
If your algorithm is suited for Cell you won'te even come close to that efficiency using PC hardware.
(And IBM's Cell servers are around 15 times more expensive)</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149604</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149946</id>
	<title>This is important people, it's for CHILD PORN</title>
	<author>Anonymous</author>
	<datestamp>1257075900000</datestamp>
	<modclass>Troll</modclass>
	<modscore>0</modscore>
	<htmltext><p>Can we waive the Constitution and give these brave law enforcement folks a billion trillion dollars to buy PS3's? This is about fighting CHILD PORN.</p><p>Child porn is almost as big a threat as terrorism. ALMOST.</p></htmltext>
<tokenext>Can we waive the Constitution and give these brave law enforcement folks a billion trillion dollars to buy PS3 's ?
This is about fighting CHILD PORN.Child porn is almost as big a threat as terrorism .
ALMOST .</tokentext>
<sentencetext>Can we waive the Constitution and give these brave law enforcement folks a billion trillion dollars to buy PS3's?
This is about fighting CHILD PORN.Child porn is almost as big a threat as terrorism.
ALMOST.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30182564</id>
	<title>Re:Hmmmm</title>
	<author>Anonymous</author>
	<datestamp>1258834380000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>IthiNkthereF0rIam</p><p>Passhphrases are the way to go here. Yes people will/do have these issues. However, even using something as simple as "yourfullname" with a ! or # or \% increases the amount of time necessary for them to crack your password. Far easier to remember a phrase that you love and enjoy than trying to remember just a random set of characters typed into a field.</p><p>for instance had KSM used "Khalid&amp;Sheikh&amp;Mohammed!" How long would it take for them to brute force that? -- seriously, math geniuses gimme a number please.</p></htmltext>
<tokenext>IthiNkthereF0rIamPasshphrases are the way to go here .
Yes people will/do have these issues .
However , even using something as simple as " yourfullname " with a !
or # or \ % increases the amount of time necessary for them to crack your password .
Far easier to remember a phrase that you love and enjoy than trying to remember just a random set of characters typed into a field.for instance had KSM used " Khalid&amp;Sheikh&amp;Mohammed !
" How long would it take for them to brute force that ?
-- seriously , math geniuses gim me a number please .</tokentext>
<sentencetext>IthiNkthereF0rIamPasshphrases are the way to go here.
Yes people will/do have these issues.
However, even using something as simple as "yourfullname" with a !
or # or \% increases the amount of time necessary for them to crack your password.
Far easier to remember a phrase that you love and enjoy than trying to remember just a random set of characters typed into a field.for instance had KSM used "Khalid&amp;Sheikh&amp;Mohammed!
" How long would it take for them to brute force that?
-- seriously, math geniuses gimme a number please.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150566</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150584</id>
	<title>Re:Nice move Sony</title>
	<author>icebraining</author>
	<datestamp>1257078660000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Actually,</p><blockquote><div><p>ICE is hoping to buy 40 more original PS3s, <b>through auction sites such as eBay.com</b>, to add to the 20 it already has, Davenport said.</p></div></blockquote><p>So they're not buying from Sony. Not could they, as Sony doesn't sell the pre-Slims anymore, which are the only ones that can legally run Linux.</p></div>
	</htmltext>
<tokenext>Actually,ICE is hoping to buy 40 more original PS3s , through auction sites such as eBay.com , to add to the 20 it already has , Davenport said.So they 're not buying from Sony .
Not could they , as Sony does n't sell the pre-Slims anymore , which are the only ones that can legally run Linux .</tokentext>
<sentencetext>Actually,ICE is hoping to buy 40 more original PS3s, through auction sites such as eBay.com, to add to the 20 it already has, Davenport said.So they're not buying from Sony.
Not could they, as Sony doesn't sell the pre-Slims anymore, which are the only ones that can legally run Linux.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149844</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153222</id>
	<title>More than that</title>
	<author>aepervius</author>
	<datestamp>1257099480000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Some of the system I used allowed to enter with alt+3 digits other ascii char like 00. You just need to know and try if it allows it or not, taking the risk that a later update will break it down, but that is valid only if you updates on regular basis. I do not use that trick anymore but when i use a passphrase for important stuff, there is no space but the dictionary word are distorted (1 br3ak [th!s] 0\_n\_e) and mixed with various char like<nobr> <wbr></nobr>,;:.-\_+/ etc... 6 words out of a dictionary is <b>not</b> a decent passphrase *at all* as you can use dictionary. 6 word warped and mixed with various char is neigh unbreakable.</htmltext>
<tokenext>Some of the system I used allowed to enter with alt + 3 digits other ascii char like 00 .
You just need to know and try if it allows it or not , taking the risk that a later update will break it down , but that is valid only if you updates on regular basis .
I do not use that trick anymore but when i use a passphrase for important stuff , there is no space but the dictionary word are distorted ( 1 br3ak [ th ! s ] 0 \ _n \ _e ) and mixed with various char like , ; : .- \ _ + / etc... 6 words out of a dictionary is not a decent passphrase * at all * as you can use dictionary .
6 word warped and mixed with various char is neigh unbreakable .</tokentext>
<sentencetext>Some of the system I used allowed to enter with alt+3 digits other ascii char like 00.
You just need to know and try if it allows it or not, taking the risk that a later update will break it down, but that is valid only if you updates on regular basis.
I do not use that trick anymore but when i use a passphrase for important stuff, there is no space but the dictionary word are distorted (1 br3ak [th!s] 0\_n\_e) and mixed with various char like ,;:.-\_+/ etc... 6 words out of a dictionary is not a decent passphrase *at all* as you can use dictionary.
6 word warped and mixed with various char is neigh unbreakable.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149718</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150570</id>
	<title>Ron Paul</title>
	<author>BitHive</author>
	<datestamp>1257078600000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Good thing the government is inept and everything they do is an unmitigated failure!</p></htmltext>
<tokenext>Good thing the government is inept and everything they do is an unmitigated failure !</tokentext>
<sentencetext>Good thing the government is inept and everything they do is an unmitigated failure!</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149658</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149998</id>
	<title>Re:Right idea, poor execution</title>
	<author>sternn64</author>
	<datestamp>1257076020000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>You get access to six of the eight SPEs of the Cell under Linux.  One core is disabled for a better yield, and one is reserved for the hypervisor.  Just the RSX is locked out.</htmltext>
<tokenext>You get access to six of the eight SPEs of the Cell under Linux .
One core is disabled for a better yield , and one is reserved for the hypervisor .
Just the RSX is locked out .</tokentext>
<sentencetext>You get access to six of the eight SPEs of the Cell under Linux.
One core is disabled for a better yield, and one is reserved for the hypervisor.
Just the RSX is locked out.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149604</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30157500</id>
	<title>Re:Nit-picking the article</title>
	<author>cenc</author>
	<datestamp>1258649940000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>What about password cracking in Asian languages?  Do they have a special dictionary for Chinese passwords? How about all the "dead" or obscure langauges that do have methods for computer representation?</p><p>Everyone talks about English dictionary cracking, but what about other languages? Does anyone have any experience with doing this?</p><p>What do they do with Arabic passwords for instance?</p></htmltext>
<tokenext>What about password cracking in Asian languages ?
Do they have a special dictionary for Chinese passwords ?
How about all the " dead " or obscure langauges that do have methods for computer representation ? Everyone talks about English dictionary cracking , but what about other languages ?
Does anyone have any experience with doing this ? What do they do with Arabic passwords for instance ?</tokentext>
<sentencetext>What about password cracking in Asian languages?
Do they have a special dictionary for Chinese passwords?
How about all the "dead" or obscure langauges that do have methods for computer representation?Everyone talks about English dictionary cracking, but what about other languages?
Does anyone have any experience with doing this?What do they do with Arabic passwords for instance?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150030</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152714</id>
	<title>Re:Nvidia 8800GT PS3</title>
	<author>zaffir</author>
	<datestamp>1257093660000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>The Cell is the CPU, not the GPU, of the PS3. Anyone saying the CPU is powerful because of its GPU is wrong. The GPU in the PS3 is actually kinda weak, but the six 128 bit vector processors hanging off the back of a main processor in the Cell are quite fast. Not as fast at SOME tasks as something capable of running CUDA code, but still really fast and far more general purpose.</p><p>That said, for this application I don't know why they aren't using something like a machine with a few NVidia graphics boards in it.</p></htmltext>
<tokenext>The Cell is the CPU , not the GPU , of the PS3 .
Anyone saying the CPU is powerful because of its GPU is wrong .
The GPU in the PS3 is actually kinda weak , but the six 128 bit vector processors hanging off the back of a main processor in the Cell are quite fast .
Not as fast at SOME tasks as something capable of running CUDA code , but still really fast and far more general purpose.That said , for this application I do n't know why they are n't using something like a machine with a few NVidia graphics boards in it .</tokentext>
<sentencetext>The Cell is the CPU, not the GPU, of the PS3.
Anyone saying the CPU is powerful because of its GPU is wrong.
The GPU in the PS3 is actually kinda weak, but the six 128 bit vector processors hanging off the back of a main processor in the Cell are quite fast.
Not as fast at SOME tasks as something capable of running CUDA code, but still really fast and far more general purpose.That said, for this application I don't know why they aren't using something like a machine with a few NVidia graphics boards in it.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150436</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153246</id>
	<title>Re:How does this work?</title>
	<author>falconwolf</author>
	<datestamp>1257099780000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><i>Seems to me that a reasonably well designed OS would lock after 4 password attempts. How are they entering all these passwords w/o the system balking?</i></p><p>I thought the same at first, however if you copy or clone the disk then run the cracker program on the PS3 what can stop it?  No program on the original computer is needed.  I thought then that decrypters would need to know what algorithm was used to encrypt the data, but even here I don't really know if it's needed or not.</p><p>

Falcon</p></htmltext>
<tokenext>Seems to me that a reasonably well designed OS would lock after 4 password attempts .
How are they entering all these passwords w/o the system balking ? I thought the same at first , however if you copy or clone the disk then run the cracker program on the PS3 what can stop it ?
No program on the original computer is needed .
I thought then that decrypters would need to know what algorithm was used to encrypt the data , but even here I do n't really know if it 's needed or not .
Falcon</tokentext>
<sentencetext>Seems to me that a reasonably well designed OS would lock after 4 password attempts.
How are they entering all these passwords w/o the system balking?I thought the same at first, however if you copy or clone the disk then run the cracker program on the PS3 what can stop it?
No program on the original computer is needed.
I thought then that decrypters would need to know what algorithm was used to encrypt the data, but even here I don't really know if it's needed or not.
Falcon</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150456</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152546</id>
	<title>Re:How does this work?</title>
	<author>Anonymous</author>
	<datestamp>1257091860000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Passwords are stored in a <a href="http://en.wikipedia.org/wiki/Cryptographic\_hash\_function" title="wikipedia.org" rel="nofollow">hash</a> [wikipedia.org].  You copy the hash and work from there.</p></htmltext>
<tokenext>Passwords are stored in a hash [ wikipedia.org ] .
You copy the hash and work from there .</tokentext>
<sentencetext>Passwords are stored in a hash [wikipedia.org].
You copy the hash and work from there.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150456</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30159484</id>
	<title>Re:Hmmmm</title>
	<author>Rich0</author>
	<datestamp>1258655940000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I suspect that if we really want to be secure than the dongle is the only way to go.</p><p>For website login something similar to RSA SecurID would work.  Better still, give the dongle some way to communicate bidirectionally (USB for web, speaker/mic/modem for phone), and then it can do an RSA challenge/response.  The private key never leaves the dongle, EVER.</p><p>For encryption you can again use a dongle.  In this case you probably need to have the session key leave the dongle since otherwise you need a high-speed link and the dongle has to stay attached to the computer.</p><p>The dongle has a keypad/display, and requires the input of a PIN to work.  The dongle of course is built to resist hardware-level attacks (SEMs/etc).  Upon input of an owner-designated fake PIN, the dongle wipes its memory.</p><p>The limiting factors with this approach are:</p><p>1.  Hardware resistance of the dongle.  It has to be VERY resistant to being taken apart without destruction of the keys.<br>2.  For encryption, the implementation on the host PC is important since it will see the session key.  It is critical that it never be written to disk or otherwise leak.<br>3.  If a PC is captured in a powered on state it might be possible to break in with the encryption key still in RAM, or to use hardware-level attacks on the PC to retrieve the contents of RAM.<br>4.  Other hardware-level attacks against a host PC are possible, such as tapping various busses/etc.</p><p>Weaknesses #2-4 only apply to use for encryption by the host.  Encryption performed by the dongle, and authentication have only weakness #1, since the key doesn't leave the device.  The application being provided with the authentication could of course have other weaknesses (replay attacks, etc), but those aren't inherent to this design.</p></htmltext>
<tokenext>I suspect that if we really want to be secure than the dongle is the only way to go.For website login something similar to RSA SecurID would work .
Better still , give the dongle some way to communicate bidirectionally ( USB for web , speaker/mic/modem for phone ) , and then it can do an RSA challenge/response .
The private key never leaves the dongle , EVER.For encryption you can again use a dongle .
In this case you probably need to have the session key leave the dongle since otherwise you need a high-speed link and the dongle has to stay attached to the computer.The dongle has a keypad/display , and requires the input of a PIN to work .
The dongle of course is built to resist hardware-level attacks ( SEMs/etc ) .
Upon input of an owner-designated fake PIN , the dongle wipes its memory.The limiting factors with this approach are : 1 .
Hardware resistance of the dongle .
It has to be VERY resistant to being taken apart without destruction of the keys.2 .
For encryption , the implementation on the host PC is important since it will see the session key .
It is critical that it never be written to disk or otherwise leak.3 .
If a PC is captured in a powered on state it might be possible to break in with the encryption key still in RAM , or to use hardware-level attacks on the PC to retrieve the contents of RAM.4 .
Other hardware-level attacks against a host PC are possible , such as tapping various busses/etc.Weaknesses # 2-4 only apply to use for encryption by the host .
Encryption performed by the dongle , and authentication have only weakness # 1 , since the key does n't leave the device .
The application being provided with the authentication could of course have other weaknesses ( replay attacks , etc ) , but those are n't inherent to this design .</tokentext>
<sentencetext>I suspect that if we really want to be secure than the dongle is the only way to go.For website login something similar to RSA SecurID would work.
Better still, give the dongle some way to communicate bidirectionally (USB for web, speaker/mic/modem for phone), and then it can do an RSA challenge/response.
The private key never leaves the dongle, EVER.For encryption you can again use a dongle.
In this case you probably need to have the session key leave the dongle since otherwise you need a high-speed link and the dongle has to stay attached to the computer.The dongle has a keypad/display, and requires the input of a PIN to work.
The dongle of course is built to resist hardware-level attacks (SEMs/etc).
Upon input of an owner-designated fake PIN, the dongle wipes its memory.The limiting factors with this approach are:1.
Hardware resistance of the dongle.
It has to be VERY resistant to being taken apart without destruction of the keys.2.
For encryption, the implementation on the host PC is important since it will see the session key.
It is critical that it never be written to disk or otherwise leak.3.
If a PC is captured in a powered on state it might be possible to break in with the encryption key still in RAM, or to use hardware-level attacks on the PC to retrieve the contents of RAM.4.
Other hardware-level attacks against a host PC are possible, such as tapping various busses/etc.Weaknesses #2-4 only apply to use for encryption by the host.
Encryption performed by the dongle, and authentication have only weakness #1, since the key doesn't leave the device.
The application being provided with the authentication could of course have other weaknesses (replay attacks, etc), but those aren't inherent to this design.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30154164</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150108</id>
	<title>Re:Right idea, poor execution</title>
	<author>klingens</author>
	<datestamp>1257076440000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p>Sorry to inform you that your memory isn't serving you. The SPEs work in Linux just fine, it's the videocard that doesn't. In short, Sony doesn't want you to play games under Linux so no one can develop games that run on Linux (cirvumventing Sony's stranglehold on the hardware) for the PS3. Linux games wouldn't need to pay Sony for each game sold as the normal titles do.</p></htmltext>
<tokenext>Sorry to inform you that your memory is n't serving you .
The SPEs work in Linux just fine , it 's the videocard that does n't .
In short , Sony does n't want you to play games under Linux so no one can develop games that run on Linux ( cirvumventing Sony 's stranglehold on the hardware ) for the PS3 .
Linux games would n't need to pay Sony for each game sold as the normal titles do .</tokentext>
<sentencetext>Sorry to inform you that your memory isn't serving you.
The SPEs work in Linux just fine, it's the videocard that doesn't.
In short, Sony doesn't want you to play games under Linux so no one can develop games that run on Linux (cirvumventing Sony's stranglehold on the hardware) for the PS3.
Linux games wouldn't need to pay Sony for each game sold as the normal titles do.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149604</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152738</id>
	<title>Re:Right idea, poor execution</title>
	<author>mindstrm</author>
	<datestamp>1257093900000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>The PS3 disables one (the GPU) out of six cores - the other five being very fast, and useable.</p><p>The very reason labs all over were building small clusters of PS3's was because, dollar for dollar, it provided a much cheaper alternative than any other solution.</p></htmltext>
<tokenext>The PS3 disables one ( the GPU ) out of six cores - the other five being very fast , and useable.The very reason labs all over were building small clusters of PS3 's was because , dollar for dollar , it provided a much cheaper alternative than any other solution .</tokentext>
<sentencetext>The PS3 disables one (the GPU) out of six cores - the other five being very fast, and useable.The very reason labs all over were building small clusters of PS3's was because, dollar for dollar, it provided a much cheaper alternative than any other solution.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149604</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149622</id>
	<title>Re:What</title>
	<author>plover</author>
	<datestamp>1257074640000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p>It's a news article featuring small sound bites and quotes.  It's not an in-depth technological review.  Nobody quoted the environment in which they benchmarking their tests:  AES-128, 3DES, DES, or whatever.</p><p>And yes you certainly could test 4 million passwords a second on these machines, but again it really depends entirely on what algorithm you're attacking.</p></htmltext>
<tokenext>It 's a news article featuring small sound bites and quotes .
It 's not an in-depth technological review .
Nobody quoted the environment in which they benchmarking their tests : AES-128 , 3DES , DES , or whatever.And yes you certainly could test 4 million passwords a second on these machines , but again it really depends entirely on what algorithm you 're attacking .</tokentext>
<sentencetext>It's a news article featuring small sound bites and quotes.
It's not an in-depth technological review.
Nobody quoted the environment in which they benchmarking their tests:  AES-128, 3DES, DES, or whatever.And yes you certainly could test 4 million passwords a second on these machines, but again it really depends entirely on what algorithm you're attacking.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149520</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30158982</id>
	<title>Re:Hmmmm</title>
	<author>Anonymous</author>
	<datestamp>1258654380000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>For security-critical things like banking, there is always the keychain counter - a device that displays a series of digits or alphanumeric sequence when a button is pressed, according to an internal clock and secret number. User reads from the device, and types it into the site. Server at the other end verifies the string is correct for the current time. No sequence can be used more than once, and they can't be used more than a few minutes after they are generated.</p><p>The expense of building those devices and mailing them to users means that it's limited to the most paranoid of users. Even most banks arn't willing to spend that much on security.</p></htmltext>
<tokenext>For security-critical things like banking , there is always the keychain counter - a device that displays a series of digits or alphanumeric sequence when a button is pressed , according to an internal clock and secret number .
User reads from the device , and types it into the site .
Server at the other end verifies the string is correct for the current time .
No sequence can be used more than once , and they ca n't be used more than a few minutes after they are generated.The expense of building those devices and mailing them to users means that it 's limited to the most paranoid of users .
Even most banks ar n't willing to spend that much on security .</tokentext>
<sentencetext>For security-critical things like banking, there is always the keychain counter - a device that displays a series of digits or alphanumeric sequence when a button is pressed, according to an internal clock and secret number.
User reads from the device, and types it into the site.
Server at the other end verifies the string is correct for the current time.
No sequence can be used more than once, and they can't be used more than a few minutes after they are generated.The expense of building those devices and mailing them to users means that it's limited to the most paranoid of users.
Even most banks arn't willing to spend that much on security.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150566</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150256</id>
	<title>Re: You need ciphersaber</title>
	<author>Joce640k</author>
	<datestamp>1257077040000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><a href="http://ciphersaber.gurus.org/" title="gurus.org">http://ciphersaber.gurus.org/</a> [gurus.org]</p></htmltext>
<tokenext>http : //ciphersaber.gurus.org/ [ gurus.org ]</tokentext>
<sentencetext>http://ciphersaber.gurus.org/ [gurus.org]</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149634</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153720</id>
	<title>Re:What</title>
	<author>CharlyFoxtrot</author>
	<datestamp>1258662180000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>For single files &amp; quick and dirty: you can use the "crypt" command or "vi -C filename", it's relatively weak DES encryption though. Or you can use <a href="http://www.madboa.com/geek/openssl/#encrypt-simple" title="madboa.com">openssl</a> [madboa.com].<br>For collections of files and disks : Truecrypt.</p></htmltext>
<tokenext>For single files &amp; quick and dirty : you can use the " crypt " command or " vi -C filename " , it 's relatively weak DES encryption though .
Or you can use openssl [ madboa.com ] .For collections of files and disks : Truecrypt .</tokentext>
<sentencetext>For single files &amp; quick and dirty: you can use the "crypt" command or "vi -C filename", it's relatively weak DES encryption though.
Or you can use openssl [madboa.com].For collections of files and disks : Truecrypt.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149634</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150036</id>
	<title>Re:And the problem with this is???</title>
	<author>Anonymous</author>
	<datestamp>1257076140000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><blockquote><div><p>Really what is the problem with this</p></div></blockquote><p>The problem is that a tool is being used weirdly.  Is a PS3 really a more powerful parallel computer per dollar than the various cards from Nvidia and ATI?  Maybe it is, but <em>if</em> it is, then I have a gripe against Nvidia and ATI.</p></div>
	</htmltext>
<tokenext>Really what is the problem with thisThe problem is that a tool is being used weirdly .
Is a PS3 really a more powerful parallel computer per dollar than the various cards from Nvidia and ATI ?
Maybe it is , but if it is , then I have a gripe against Nvidia and ATI .</tokentext>
<sentencetext>Really what is the problem with thisThe problem is that a tool is being used weirdly.
Is a PS3 really a more powerful parallel computer per dollar than the various cards from Nvidia and ATI?
Maybe it is, but if it is, then I have a gripe against Nvidia and ATI.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149794</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150626</id>
	<title>Re:Call me paranoid, but</title>
	<author>Totenglocke</author>
	<datestamp>1257078900000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>2</modscore>
	<htmltext>Question: How does this get modded troll?  Slashdot is known for it's blatant distrust of government surveillance, so how does pointing out that there's no reason to believe the government's claims that they won't use this for cracking anything but legally seized computers amount to trolling?</htmltext>
<tokenext>Question : How does this get modded troll ?
Slashdot is known for it 's blatant distrust of government surveillance , so how does pointing out that there 's no reason to believe the government 's claims that they wo n't use this for cracking anything but legally seized computers amount to trolling ?</tokentext>
<sentencetext>Question: How does this get modded troll?
Slashdot is known for it's blatant distrust of government surveillance, so how does pointing out that there's no reason to believe the government's claims that they won't use this for cracking anything but legally seized computers amount to trolling?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149546</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150262</id>
	<title>Re:Trust me.</title>
	<author>amasiancrasian</author>
	<datestamp>1257077100000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Well, how else are government employees going to convince purchasers to buy PS3s so they can play games? They can now "crack" passwords AND play Dragon Age: Origins! Win-win!</htmltext>
<tokenext>Well , how else are government employees going to convince purchasers to buy PS3s so they can play games ?
They can now " crack " passwords AND play Dragon Age : Origins !
Win-win !</tokentext>
<sentencetext>Well, how else are government employees going to convince purchasers to buy PS3s so they can play games?
They can now "crack" passwords AND play Dragon Age: Origins!
Win-win!</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149628</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149790</id>
	<title>Re:Right idea, poor execution</title>
	<author>Anonymous</author>
	<datestamp>1257075240000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>IIRC, it lets you use 7 of the 8 Vector cores.  So while you can't use ALL of them, you can use most of them.</p></htmltext>
<tokenext>IIRC , it lets you use 7 of the 8 Vector cores .
So while you ca n't use ALL of them , you can use most of them .</tokentext>
<sentencetext>IIRC, it lets you use 7 of the 8 Vector cores.
So while you can't use ALL of them, you can use most of them.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149604</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30155212</id>
	<title>Re:Nvidia 8800GT PS3</title>
	<author>ymgve</author>
	<datestamp>1258641120000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Why would you want the double-precision version? Crypto is all about integer math.</p></htmltext>
<tokenext>Why would you want the double-precision version ?
Crypto is all about integer math .</tokentext>
<sentencetext>Why would you want the double-precision version?
Crypto is all about integer math.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30154002</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30154824</id>
	<title>Re:Nit-picking the article</title>
	<author>Anonymous</author>
	<datestamp>1258637640000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><div class="quote"><p>I used character 255 back in the Windows 3.1 days to make directories that no one else could figure out how to get in to</p></div><p>That's nothing. When I was young I had to keep my porn hidden under my mattress.</p></div>
	</htmltext>
<tokenext>I used character 255 back in the Windows 3.1 days to make directories that no one else could figure out how to get in toThat 's nothing .
When I was young I had to keep my porn hidden under my mattress .</tokentext>
<sentencetext>I used character 255 back in the Windows 3.1 days to make directories that no one else could figure out how to get in toThat's nothing.
When I was young I had to keep my porn hidden under my mattress.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150030</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150362</id>
	<title>Re:Nit-picking the article</title>
	<author>Lord Ender</author>
	<datestamp>1257077520000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>There are actually 95 typable characters on a US keyboard. (26 letters + 10 numbers +11 symbols) x2 (with shift key) + spacebar.</p><p><b>95^20 = 2^128</b>, so if you're using fewer than 20 characters with your AES128 encryption, you don't really have AES128 encryption...</p></htmltext>
<tokenext>There are actually 95 typable characters on a US keyboard .
( 26 letters + 10 numbers + 11 symbols ) x2 ( with shift key ) + spacebar.95 ^ 20 = 2 ^ 128 , so if you 're using fewer than 20 characters with your AES128 encryption , you do n't really have AES128 encryption.. .</tokentext>
<sentencetext>There are actually 95 typable characters on a US keyboard.
(26 letters + 10 numbers +11 symbols) x2 (with shift key) + spacebar.95^20 = 2^128, so if you're using fewer than 20 characters with your AES128 encryption, you don't really have AES128 encryption...</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149718</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149890</id>
	<title>Re:Call me paranoid, but</title>
	<author>spanky the monk</author>
	<datestamp>1257075660000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I don't think the OP even believes that.</htmltext>
<tokenext>I do n't think the OP even believes that .</tokentext>
<sentencetext>I don't think the OP even believes that.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149546</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149914</id>
	<title>Re:they'll need more... a lot more</title>
	<author>Anonymous</author>
	<datestamp>1257075780000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>The other question is where will they get these new PS3s?<br>All new PS3s (and any old ones that are updated to the latest firmware) are incapable of booting Linux.</p></htmltext>
<tokenext>The other question is where will they get these new PS3s ? All new PS3s ( and any old ones that are updated to the latest firmware ) are incapable of booting Linux .</tokentext>
<sentencetext>The other question is where will they get these new PS3s?All new PS3s (and any old ones that are updated to the latest firmware) are incapable of booting Linux.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149800</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151064</id>
	<title>Re:Hmmmm</title>
	<author>Anonymous</author>
	<datestamp>1257081300000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>They'd be better off using this to generate large rainbow tables. Reversing 8 char MD5 doesn't take 3.3 hours, it takes about 3 minutes.</p></htmltext>
<tokenext>They 'd be better off using this to generate large rainbow tables .
Reversing 8 char MD5 does n't take 3.3 hours , it takes about 3 minutes .</tokentext>
<sentencetext>They'd be better off using this to generate large rainbow tables.
Reversing 8 char MD5 doesn't take 3.3 hours, it takes about 3 minutes.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150566</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150566</id>
	<title>Hmmmm</title>
	<author>Idiomatick</author>
	<datestamp>1257078600000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>4</modscore>
	<htmltext>
With the planned 60 PS3s assuming they brute force it and worst-case. It will take them:
<br> <br>
At 8character passwords w/ letters and numbers only, 3.3hours.<br>
Upper and lower case increase that figure to 10.5days. (With 9 characters 7.15years)<br>
84character set brings us up to 119.5days.<br>
Note: I just used x^8 which isn't totally accurate, the numbers in reality are a bit larger but it doesn't matter much.
<br> <br>

This makes me wonder in case this is true. We are running up to a physical limitation in the human brain. People already have trouble memorizing the dozens of 8character passwords. 9 characters will hold moores law off for a few more years (not the precise meaning of moores law but you know what i mean). The problem is also that people are getting more accounts for things. Most people even today use the same passwords for a variety of things. I'd say almost all people.<br> <br>So I ask the<nobr> <wbr></nobr>/. crowd are there any good alternatives to passwords that are feasible? Something secure. Something that can be implemented on websites. What do you think we should be working towards? Is there already something in place that you can give an example of?</htmltext>
<tokenext>With the planned 60 PS3s assuming they brute force it and worst-case .
It will take them : At 8character passwords w/ letters and numbers only , 3.3hours .
Upper and lower case increase that figure to 10.5days .
( With 9 characters 7.15years ) 84character set brings us up to 119.5days .
Note : I just used x ^ 8 which is n't totally accurate , the numbers in reality are a bit larger but it does n't matter much .
This makes me wonder in case this is true .
We are running up to a physical limitation in the human brain .
People already have trouble memorizing the dozens of 8character passwords .
9 characters will hold moores law off for a few more years ( not the precise meaning of moores law but you know what i mean ) .
The problem is also that people are getting more accounts for things .
Most people even today use the same passwords for a variety of things .
I 'd say almost all people .
So I ask the / .
crowd are there any good alternatives to passwords that are feasible ?
Something secure .
Something that can be implemented on websites .
What do you think we should be working towards ?
Is there already something in place that you can give an example of ?</tokentext>
<sentencetext>
With the planned 60 PS3s assuming they brute force it and worst-case.
It will take them:
 
At 8character passwords w/ letters and numbers only, 3.3hours.
Upper and lower case increase that figure to 10.5days.
(With 9 characters 7.15years)
84character set brings us up to 119.5days.
Note: I just used x^8 which isn't totally accurate, the numbers in reality are a bit larger but it doesn't matter much.
This makes me wonder in case this is true.
We are running up to a physical limitation in the human brain.
People already have trouble memorizing the dozens of 8character passwords.
9 characters will hold moores law off for a few more years (not the precise meaning of moores law but you know what i mean).
The problem is also that people are getting more accounts for things.
Most people even today use the same passwords for a variety of things.
I'd say almost all people.
So I ask the /.
crowd are there any good alternatives to passwords that are feasible?
Something secure.
Something that can be implemented on websites.
What do you think we should be working towards?
Is there already something in place that you can give an example of?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150386</id>
	<title>And Sony's thoughts?</title>
	<author>Anonymous</author>
	<datestamp>1257077640000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>I'm sure Sony loves this! They get to subsidize the cost of the PS3s without ever recouping licensing fees.

Even with subsidies, Isn't there a more cost effective Cell solution?</htmltext>
<tokenext>I 'm sure Sony loves this !
They get to subsidize the cost of the PS3s without ever recouping licensing fees .
Even with subsidies , Is n't there a more cost effective Cell solution ?</tokentext>
<sentencetext>I'm sure Sony loves this!
They get to subsidize the cost of the PS3s without ever recouping licensing fees.
Even with subsidies, Isn't there a more cost effective Cell solution?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150576</id>
	<title>Re:Nit-picking the article</title>
	<author>Anonymous</author>
	<datestamp>1257078600000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><div class="quote"><p>"He explained that the number of possible combinations in a six-<b>digit</b> password is 256 to the sixth power."</p></div><p>I'd think there would be 10^6 combinations (digit meaning 0..9)</p></div>
	</htmltext>
<tokenext>" He explained that the number of possible combinations in a six-digit password is 256 to the sixth power .
" I 'd think there would be 10 ^ 6 combinations ( digit meaning 0..9 )</tokentext>
<sentencetext>"He explained that the number of possible combinations in a six-digit password is 256 to the sixth power.
"I'd think there would be 10^6 combinations (digit meaning 0..9)
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149718</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151716</id>
	<title>TrueCrypt</title>
	<author>falconwolf</author>
	<datestamp>1257085140000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>While TrueCrypt encrypts what makes it real good is it hides files.</p><p>

Falcon</p></htmltext>
<tokenext>While TrueCrypt encrypts what makes it real good is it hides files .
Falcon</tokentext>
<sentencetext>While TrueCrypt encrypts what makes it real good is it hides files.
Falcon</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149768</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30154536</id>
	<title>Re:How does this work?</title>
	<author>Radtoo</author>
	<datestamp>1258632660000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>First realize this: It is still possible to make a copy of the whole thing that was encrypted. So, you could have a hundred copies of that OS running when you crack the password. It wouldn't matter much even if after four attempts the OS deleted the files that are relevant to getting access- there would still be copies.
<br> <br>
However things are simpler, the OS itself isn't even required. An attacker usually can just copy the figurative lock on the box a lot of times and then let his horde of minions (PS3, in this case, since their cell cpu are better at this than other cpu) try to break that.
<br> <br>
So if they used more PS3s they'd very likely be able to try as many more passwords.</htmltext>
<tokenext>First realize this : It is still possible to make a copy of the whole thing that was encrypted .
So , you could have a hundred copies of that OS running when you crack the password .
It would n't matter much even if after four attempts the OS deleted the files that are relevant to getting access- there would still be copies .
However things are simpler , the OS itself is n't even required .
An attacker usually can just copy the figurative lock on the box a lot of times and then let his horde of minions ( PS3 , in this case , since their cell cpu are better at this than other cpu ) try to break that .
So if they used more PS3s they 'd very likely be able to try as many more passwords .</tokentext>
<sentencetext>First realize this: It is still possible to make a copy of the whole thing that was encrypted.
So, you could have a hundred copies of that OS running when you crack the password.
It wouldn't matter much even if after four attempts the OS deleted the files that are relevant to getting access- there would still be copies.
However things are simpler, the OS itself isn't even required.
An attacker usually can just copy the figurative lock on the box a lot of times and then let his horde of minions (PS3, in this case, since their cell cpu are better at this than other cpu) try to break that.
So if they used more PS3s they'd very likely be able to try as many more passwords.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150456</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149604</id>
	<title>Right idea, poor execution</title>
	<author>Anonymous</author>
	<datestamp>1257074580000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>If memory servers, the cell platform in a PS3 doesn't allow you to use all of the cores when you're running linux. So, for the price of a new ps3, they could just as easily use commodity hardware from last year and probably get better throughput.</htmltext>
<tokenext>If memory servers , the cell platform in a PS3 does n't allow you to use all of the cores when you 're running linux .
So , for the price of a new ps3 , they could just as easily use commodity hardware from last year and probably get better throughput .</tokentext>
<sentencetext>If memory servers, the cell platform in a PS3 doesn't allow you to use all of the cores when you're running linux.
So, for the price of a new ps3, they could just as easily use commodity hardware from last year and probably get better throughput.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30156450</id>
	<title>Plausible deniability?</title>
	<author>Anonymous</author>
	<datestamp>1258646760000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Not one mention yet of plausible deniability. Tell that Customs high-school dropout the "secondary" password, and instead of your child porn/material criticizing the government, they wind up with pictures of cats playing pianos.</p></htmltext>
<tokenext>Not one mention yet of plausible deniability .
Tell that Customs high-school dropout the " secondary " password , and instead of your child porn/material criticizing the government , they wind up with pictures of cats playing pianos .</tokentext>
<sentencetext>Not one mention yet of plausible deniability.
Tell that Customs high-school dropout the "secondary" password, and instead of your child porn/material criticizing the government, they wind up with pictures of cats playing pianos.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150146</id>
	<title>Re:Lovely encryption</title>
	<author>mea37</author>
	<datestamp>1257076500000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>1) The cases you tend to think about where "the public" cracks encryption implemented by corporations are DMCA violations.  However, that's not (as you imply) because of who's doing it or who implemented the encryption; it's because of what function the encryption is serving.  If I crack the boot password on your laptop, DMCA violations aren't what I'm guilty of.</p><p>2) Yes, there are <i>many, many things</i> that are permissable when done by the government but illegal if done by a private citizen.  There always have been, there always will be.  Probably the majority of things done in the investigation of suspected crimes fall into this category, and unsurprisingly this is one of them.</p><p>Now if I go by recent track record of how people respond when called on bs while trying to sound anti-establishment chic around here, you'll tell me your comment was just a joke, as though that would somehow make it any less full of crap.</p></htmltext>
<tokenext>1 ) The cases you tend to think about where " the public " cracks encryption implemented by corporations are DMCA violations .
However , that 's not ( as you imply ) because of who 's doing it or who implemented the encryption ; it 's because of what function the encryption is serving .
If I crack the boot password on your laptop , DMCA violations are n't what I 'm guilty of.2 ) Yes , there are many , many things that are permissable when done by the government but illegal if done by a private citizen .
There always have been , there always will be .
Probably the majority of things done in the investigation of suspected crimes fall into this category , and unsurprisingly this is one of them.Now if I go by recent track record of how people respond when called on bs while trying to sound anti-establishment chic around here , you 'll tell me your comment was just a joke , as though that would somehow make it any less full of crap .</tokentext>
<sentencetext>1) The cases you tend to think about where "the public" cracks encryption implemented by corporations are DMCA violations.
However, that's not (as you imply) because of who's doing it or who implemented the encryption; it's because of what function the encryption is serving.
If I crack the boot password on your laptop, DMCA violations aren't what I'm guilty of.2) Yes, there are many, many things that are permissable when done by the government but illegal if done by a private citizen.
There always have been, there always will be.
Probably the majority of things done in the investigation of suspected crimes fall into this category, and unsurprisingly this is one of them.Now if I go by recent track record of how people respond when called on bs while trying to sound anti-establishment chic around here, you'll tell me your comment was just a joke, as though that would somehow make it any less full of crap.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149658</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30154432</id>
	<title>Maths is fun!</title>
	<author>PGillingwater</author>
	<datestamp>1258630920000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Just a small note to all those clever people who are calculating the time taken to perform an exhaustive keyspace search on the potential passwords.</p><p>We should distinguish between the MAXIMUM time taken to exhaust the symbol space, versus the AVERAGE time.</p><p>Assuming uniform distribution of passwords through the space, and a sufficiently large sample of challenges, we would naturally expect the time taken to find the correct password to converge on n/2 -- i.e., half of the maximum time.</p><p>Thus, if a symbol space can be exhaustively searched in one year, on average, finding passwords with a similar difficulty level will take an average of 6 months, with a typical normal distribution.</p></htmltext>
<tokenext>Just a small note to all those clever people who are calculating the time taken to perform an exhaustive keyspace search on the potential passwords.We should distinguish between the MAXIMUM time taken to exhaust the symbol space , versus the AVERAGE time.Assuming uniform distribution of passwords through the space , and a sufficiently large sample of challenges , we would naturally expect the time taken to find the correct password to converge on n/2 -- i.e. , half of the maximum time.Thus , if a symbol space can be exhaustively searched in one year , on average , finding passwords with a similar difficulty level will take an average of 6 months , with a typical normal distribution .</tokentext>
<sentencetext>Just a small note to all those clever people who are calculating the time taken to perform an exhaustive keyspace search on the potential passwords.We should distinguish between the MAXIMUM time taken to exhaust the symbol space, versus the AVERAGE time.Assuming uniform distribution of passwords through the space, and a sufficiently large sample of challenges, we would naturally expect the time taken to find the correct password to converge on n/2 -- i.e., half of the maximum time.Thus, if a symbol space can be exhaustively searched in one year, on average, finding passwords with a similar difficulty level will take an average of 6 months, with a typical normal distribution.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151282</id>
	<title>Re:Let this be a lesson to you</title>
	<author>al0ha</author>
	<datestamp>1257082500000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>What I think you mean is that one should not use any encryption algorithm or package which is not open for peer review.  That is true, but however that is not the case for TrueCrypt.  The code and algorithms are completely open for peer review, thus it is far better than any closed source option and I for one say you should use it.  So what if it is technically not distributed under an OpenSource license?  All that means is you can't personally give it away, you must point any prospective users to the package.  As for commercial considerations, they must license it; so what is wrong with that?</htmltext>
<tokenext>What I think you mean is that one should not use any encryption algorithm or package which is not open for peer review .
That is true , but however that is not the case for TrueCrypt .
The code and algorithms are completely open for peer review , thus it is far better than any closed source option and I for one say you should use it .
So what if it is technically not distributed under an OpenSource license ?
All that means is you ca n't personally give it away , you must point any prospective users to the package .
As for commercial considerations , they must license it ; so what is wrong with that ?</tokentext>
<sentencetext>What I think you mean is that one should not use any encryption algorithm or package which is not open for peer review.
That is true, but however that is not the case for TrueCrypt.
The code and algorithms are completely open for peer review, thus it is far better than any closed source option and I for one say you should use it.
So what if it is technically not distributed under an OpenSource license?
All that means is you can't personally give it away, you must point any prospective users to the package.
As for commercial considerations, they must license it; so what is wrong with that?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150058</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149628</id>
	<title>Trust me.</title>
	<author>Anonymous</author>
	<datestamp>1257074700000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><blockquote><div><p>Naturally this is only being used to break encryption on computers seized with a warrant and suspected of harboring child pornography.</p></div></blockquote><p>

That is the only thing they use them for... Wink, wink, nudge, nudge, Know what I mean?</p></div>
	</htmltext>
<tokenext>Naturally this is only being used to break encryption on computers seized with a warrant and suspected of harboring child pornography .
That is the only thing they use them for... Wink , wink , nudge , nudge , Know what I mean ?</tokentext>
<sentencetext>Naturally this is only being used to break encryption on computers seized with a warrant and suspected of harboring child pornography.
That is the only thing they use them for... Wink, wink, nudge, nudge, Know what I mean?
	</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149718</id>
	<title>Nit-picking the article</title>
	<author>Anonymous</author>
	<datestamp>1257075000000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>3</modscore>
	<htmltext><p>"He explained that the number of possible combinations in a six-digit password is 256 to the sixth power."</p><p>Um, only if the person uses characters that can't be typed on a normal keyboard.</p><p>In practice, the password "alphabet" is either 26, 52, 62, 84, or some other number not much above 84 characters.  84^6 is much less than 256^6.</p><p>However, in practice, people who fear the cops will use a lot more than 6 digits.</p><p>If the passwords are decent passphrases of, say, 6 words, taken out of a dictionary of even 2,000 common words, that's 2,000^6, or "still not that big of a number" as it's known in the security field.  And that's if the person makes it easy by not using any spaces, using all lowercase, etc.</p><p>The real smart crooks encrypt their stuff in a way that nothing short of banging them over the head with a $5 pipe wrench will ever reveal.</p></htmltext>
<tokenext>" He explained that the number of possible combinations in a six-digit password is 256 to the sixth power .
" Um , only if the person uses characters that ca n't be typed on a normal keyboard.In practice , the password " alphabet " is either 26 , 52 , 62 , 84 , or some other number not much above 84 characters .
84 ^ 6 is much less than 256 ^ 6.However , in practice , people who fear the cops will use a lot more than 6 digits.If the passwords are decent passphrases of , say , 6 words , taken out of a dictionary of even 2,000 common words , that 's 2,000 ^ 6 , or " still not that big of a number " as it 's known in the security field .
And that 's if the person makes it easy by not using any spaces , using all lowercase , etc.The real smart crooks encrypt their stuff in a way that nothing short of banging them over the head with a $ 5 pipe wrench will ever reveal .</tokentext>
<sentencetext>"He explained that the number of possible combinations in a six-digit password is 256 to the sixth power.
"Um, only if the person uses characters that can't be typed on a normal keyboard.In practice, the password "alphabet" is either 26, 52, 62, 84, or some other number not much above 84 characters.
84^6 is much less than 256^6.However, in practice, people who fear the cops will use a lot more than 6 digits.If the passwords are decent passphrases of, say, 6 words, taken out of a dictionary of even 2,000 common words, that's 2,000^6, or "still not that big of a number" as it's known in the security field.
And that's if the person makes it easy by not using any spaces, using all lowercase, etc.The real smart crooks encrypt their stuff in a way that nothing short of banging them over the head with a $5 pipe wrench will ever reveal.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153884</id>
	<title>Re:Lovely encryption</title>
	<author>Anonymous</author>
	<datestamp>1258621980000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>"Child pornography!" is the new "Terrorism!". People got wary of "Terrorism!" cries and nobody can object something "For the children!" without getting torn to shreds by politicians in favour of more power (for themselves).</p></htmltext>
<tokenext>" Child pornography !
" is the new " Terrorism ! " .
People got wary of " Terrorism !
" cries and nobody can object something " For the children !
" without getting torn to shreds by politicians in favour of more power ( for themselves ) .</tokentext>
<sentencetext>"Child pornography!
" is the new "Terrorism!".
People got wary of "Terrorism!
" cries and nobody can object something "For the children!
" without getting torn to shreds by politicians in favour of more power (for themselves).</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149658</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152060</id>
	<title>Re:Lovely encryption</title>
	<author>tepples</author>
	<datestamp>1257087660000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>When it's the public cracking encryption implemented by corporations it's a violation of the DMCA [but not when the government cracks].</p></div><p>That was intentional from the start. Title 17, U.S. Code, section 1201(e) words it thus: "This section does not prohibit any lawfully authorized investigative, protective, information security, or intelligence activity of an officer, agent, or employee of the" government or a government contractor.</p></div>
	</htmltext>
<tokenext>When it 's the public cracking encryption implemented by corporations it 's a violation of the DMCA [ but not when the government cracks ] .That was intentional from the start .
Title 17 , U.S. Code , section 1201 ( e ) words it thus : " This section does not prohibit any lawfully authorized investigative , protective , information security , or intelligence activity of an officer , agent , or employee of the " government or a government contractor .</tokentext>
<sentencetext>When it's the public cracking encryption implemented by corporations it's a violation of the DMCA [but not when the government cracks].That was intentional from the start.
Title 17, U.S. Code, section 1201(e) words it thus: "This section does not prohibit any lawfully authorized investigative, protective, information security, or intelligence activity of an officer, agent, or employee of the" government or a government contractor.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149658</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149804</id>
	<title>Re:What</title>
	<author>Anonymous</author>
	<datestamp>1257075300000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>Just curious:<nobr> <wbr></nobr>...how does one encrypt files with a password?  Any free software available for that task?</p></div><p>BitLocker for Windows Vista/7  does the trick.</p></div>
	</htmltext>
<tokenext>Just curious : ...how does one encrypt files with a password ?
Any free software available for that task ? BitLocker for Windows Vista/7 does the trick .</tokentext>
<sentencetext>Just curious: ...how does one encrypt files with a password?
Any free software available for that task?BitLocker for Windows Vista/7  does the trick.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149634</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151088</id>
	<title>Re:Call me paranoid, but</title>
	<author>Valdrax</author>
	<datestamp>1257081480000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>Question: How does this get modded troll? Slashdot is known for it's blatant distrust of government surveillance, so how does pointing out that there's no reason to believe the government's claims that they won't use this for cracking anything but legally seized computers amount to trolling?</p></div><p>Because the mandatory sarcastic response pointing this fact out was already taken care of in the article summary.  That's the line that the GP decided to quote and redundantly react sarcastically to, as if they were the only person smart enough to see the truth.  This could be either Captain Obvious stupidity, a clumsy attempt to express a "Me too!" sentiment, or someone trolling by pretending to be really dense.  I think we can forgive the moderator for going with the last one.</p></div>
	</htmltext>
<tokenext>Question : How does this get modded troll ?
Slashdot is known for it 's blatant distrust of government surveillance , so how does pointing out that there 's no reason to believe the government 's claims that they wo n't use this for cracking anything but legally seized computers amount to trolling ? Because the mandatory sarcastic response pointing this fact out was already taken care of in the article summary .
That 's the line that the GP decided to quote and redundantly react sarcastically to , as if they were the only person smart enough to see the truth .
This could be either Captain Obvious stupidity , a clumsy attempt to express a " Me too !
" sentiment , or someone trolling by pretending to be really dense .
I think we can forgive the moderator for going with the last one .</tokentext>
<sentencetext>Question: How does this get modded troll?
Slashdot is known for it's blatant distrust of government surveillance, so how does pointing out that there's no reason to believe the government's claims that they won't use this for cracking anything but legally seized computers amount to trolling?Because the mandatory sarcastic response pointing this fact out was already taken care of in the article summary.
That's the line that the GP decided to quote and redundantly react sarcastically to, as if they were the only person smart enough to see the truth.
This could be either Captain Obvious stupidity, a clumsy attempt to express a "Me too!
" sentiment, or someone trolling by pretending to be really dense.
I think we can forgive the moderator for going with the last one.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150626</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151936</id>
	<title>PS3 GPU access from Linux?</title>
	<author>Anonymous</author>
	<datestamp>1257087000000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Did they figure out a way to access the GPU on the PS3 through Linux?  As far as I can tell, the GPU is not accessible to linux and some of the RAM is unaccessible as well.  Linux runs more like it would on virtual machine than it would running as a native OS.  Most of my info comes from forums related to PS3 modding for home theater PCs and Im no expert.  Anyone care to elaborate?  If the GPU is really locked out, then are these guys just using a pretty average PowerPC computer with a few extra processors?</p></htmltext>
<tokenext>Did they figure out a way to access the GPU on the PS3 through Linux ?
As far as I can tell , the GPU is not accessible to linux and some of the RAM is unaccessible as well .
Linux runs more like it would on virtual machine than it would running as a native OS .
Most of my info comes from forums related to PS3 modding for home theater PCs and Im no expert .
Anyone care to elaborate ?
If the GPU is really locked out , then are these guys just using a pretty average PowerPC computer with a few extra processors ?</tokentext>
<sentencetext>Did they figure out a way to access the GPU on the PS3 through Linux?
As far as I can tell, the GPU is not accessible to linux and some of the RAM is unaccessible as well.
Linux runs more like it would on virtual machine than it would running as a native OS.
Most of my info comes from forums related to PS3 modding for home theater PCs and Im no expert.
Anyone care to elaborate?
If the GPU is really locked out, then are these guys just using a pretty average PowerPC computer with a few extra processors?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30158892</id>
	<title>Re:Hmmmm</title>
	<author>CodeBuster</author>
	<datestamp>1258654080000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>It is actually not too difficult to remember longer passwords. You already remember multiple 8 character passwords, right? If you can do that then you can create longer passwords by combining them. For example, I have 32 character sequences (not English words and including numbers and symbols) that I have committed to memory and use on a regular basis when I require enhanced security.</htmltext>
<tokenext>It is actually not too difficult to remember longer passwords .
You already remember multiple 8 character passwords , right ?
If you can do that then you can create longer passwords by combining them .
For example , I have 32 character sequences ( not English words and including numbers and symbols ) that I have committed to memory and use on a regular basis when I require enhanced security .</tokentext>
<sentencetext>It is actually not too difficult to remember longer passwords.
You already remember multiple 8 character passwords, right?
If you can do that then you can create longer passwords by combining them.
For example, I have 32 character sequences (not English words and including numbers and symbols) that I have committed to memory and use on a regular basis when I require enhanced security.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150566</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151744</id>
	<title>actually...</title>
	<author>sawka</author>
	<datestamp>1257085380000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>actually they're using the ps3's to play rock band and gta 4.  but the higher ups wouldn't let the purchase order through without a more official sounding reason...</htmltext>
<tokenext>actually they 're using the ps3 's to play rock band and gta 4. but the higher ups would n't let the purchase order through without a more official sounding reason.. .</tokentext>
<sentencetext>actually they're using the ps3's to play rock band and gta 4.  but the higher ups wouldn't let the purchase order through without a more official sounding reason...</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149990</id>
	<title>I think these numbers are right...</title>
	<author>Anonymous</author>
	<datestamp>1257076020000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>--Valid password characters --<br>26 * 2 = 52 letters<br>10 * 2 = 20 numbers/symbols<br>10 * 2 = 20 other symbols</p><p>92 usable characters</p><p>92^8 =   5,132,188,731,375,616<br>92^9 = 472,161,363,286,556,672</p><p>--Break Speed--<br>Speed = 240,000,000 / per second</p><p>--8 character password--<br>5132188731375616 / 240000000 = 247 days</p><p>--9 character password--<br>472161363286556672 / 240,000,000 = 22,770 days = 62 years</p></htmltext>
<tokenext>--Valid password characters --26 * 2 = 52 letters10 * 2 = 20 numbers/symbols10 * 2 = 20 other symbols92 usable characters92 ^ 8 = 5,132,188,731,375,61692 ^ 9 = 472,161,363,286,556,672--Break Speed--Speed = 240,000,000 / per second--8 character password--5132188731375616 / 240000000 = 247 days--9 character password--472161363286556672 / 240,000,000 = 22,770 days = 62 years</tokentext>
<sentencetext>--Valid password characters --26 * 2 = 52 letters10 * 2 = 20 numbers/symbols10 * 2 = 20 other symbols92 usable characters92^8 =   5,132,188,731,375,61692^9 = 472,161,363,286,556,672--Break Speed--Speed = 240,000,000 / per second--8 character password--5132188731375616 / 240000000 = 247 days--9 character password--472161363286556672 / 240,000,000 = 22,770 days = 62 years</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152444</id>
	<title>Re:How does this work?</title>
	<author>Anonymous</author>
	<datestamp>1257090540000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>They 4 tries password limit that Windows or Mac may enforce isn't in play because law enforcement just pulls the data off the disk directly.  The notebooks operating system isn't even running.  The encrypted files may also be on a external device so possibly even easier</p></htmltext>
<tokenext>They 4 tries password limit that Windows or Mac may enforce is n't in play because law enforcement just pulls the data off the disk directly .
The notebooks operating system is n't even running .
The encrypted files may also be on a external device so possibly even easier</tokentext>
<sentencetext>They 4 tries password limit that Windows or Mac may enforce isn't in play because law enforcement just pulls the data off the disk directly.
The notebooks operating system isn't even running.
The encrypted files may also be on a external device so possibly even easier</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150456</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151946</id>
	<title>Re:How does this work?</title>
	<author>Anonymous</author>
	<datestamp>1257087000000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Take the password hash out of the system.<br>Write an optimized algorithm for the PS3 GPU that will do the encryption of that password and check</p></htmltext>
<tokenext>Take the password hash out of the system.Write an optimized algorithm for the PS3 GPU that will do the encryption of that password and check</tokentext>
<sentencetext>Take the password hash out of the system.Write an optimized algorithm for the PS3 GPU that will do the encryption of that password and check</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150456</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30155850</id>
	<title>Re:What</title>
	<author>NotBornYesterday</author>
	<datestamp>1258644420000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>There is no minimum IQ for being a moderator.  Sigh.
<br> <br>
Of course, commodore64\_love has been active around here awhile, and some mod may have thought he should have known the answer to his own question, or he could have attracted the attention of a mod-bombing foe or freak.  It happens.</htmltext>
<tokenext>There is no minimum IQ for being a moderator .
Sigh . Of course , commodore64 \ _love has been active around here awhile , and some mod may have thought he should have known the answer to his own question , or he could have attracted the attention of a mod-bombing foe or freak .
It happens .</tokentext>
<sentencetext>There is no minimum IQ for being a moderator.
Sigh.
 
Of course, commodore64\_love has been active around here awhile, and some mod may have thought he should have known the answer to his own question, or he could have attracted the attention of a mod-bombing foe or freak.
It happens.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151166</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152194</id>
	<title>Re:How does this work?</title>
	<author>Anonymous</author>
	<datestamp>1257088500000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>This isn't about cracking system logins at a prompt.  It's about encrypted files, etc.<br>Look at an encyption program like TrueCrypt (http://en.wikipedia.org/wiki/TrueCrypt) as a starting point.</p></htmltext>
<tokenext>This is n't about cracking system logins at a prompt .
It 's about encrypted files , etc.Look at an encyption program like TrueCrypt ( http : //en.wikipedia.org/wiki/TrueCrypt ) as a starting point .</tokentext>
<sentencetext>This isn't about cracking system logins at a prompt.
It's about encrypted files, etc.Look at an encyption program like TrueCrypt (http://en.wikipedia.org/wiki/TrueCrypt) as a starting point.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150456</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149748</id>
	<title>Re:Lovely encryption</title>
	<author>shawn(at)fsu</author>
	<datestamp>1257075120000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>submitter failed a lot in the summary, TFA says: <i>C3 focuses on transnational Internet crimes, including child pornography that has crossed national boundaries.</i>. It's not just for kiddie porn. It seems they would use the same tech if it was a suggested terrorist pc.</p></htmltext>
<tokenext>submitter failed a lot in the summary , TFA says : C3 focuses on transnational Internet crimes , including child pornography that has crossed national boundaries.. It 's not just for kiddie porn .
It seems they would use the same tech if it was a suggested terrorist pc .</tokentext>
<sentencetext>submitter failed a lot in the summary, TFA says: C3 focuses on transnational Internet crimes, including child pornography that has crossed national boundaries.. It's not just for kiddie porn.
It seems they would use the same tech if it was a suggested terrorist pc.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149658</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150032</id>
	<title>Re:And the problem with this is???</title>
	<author>Hatta</author>
	<datestamp>1257076140000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p>Who said there was a problem?</p></htmltext>
<tokenext>Who said there was a problem ?</tokentext>
<sentencetext>Who said there was a problem?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149794</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149642</id>
	<title>New metric...???</title>
	<author>aztektum</author>
	<datestamp>1257074760000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>Each PS3 is capable of 4 million passwords per second</p></div><p>4 million passwords a second what?</p></div>
	</htmltext>
<tokenext>Each PS3 is capable of 4 million passwords per second4 million passwords a second what ?</tokentext>
<sentencetext>Each PS3 is capable of 4 million passwords per second4 million passwords a second what?
	</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30158772</id>
	<title>Re:How does this work?</title>
	<author>CodeBuster</author>
	<datestamp>1258653660000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Obviously, they are <b> <i>not</i> </b> attempting to crack the passwords from within the system in question; they have made copies of the ciphertexts onto data storage controlled by them and accessible by the PS3s involved in the cracking effort.</htmltext>
<tokenext>Obviously , they are not attempting to crack the passwords from within the system in question ; they have made copies of the ciphertexts onto data storage controlled by them and accessible by the PS3s involved in the cracking effort .</tokentext>
<sentencetext>Obviously, they are  not  attempting to crack the passwords from within the system in question; they have made copies of the ciphertexts onto data storage controlled by them and accessible by the PS3s involved in the cracking effort.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150456</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151662</id>
	<title>Re:Wow, 4 million passwords per second...</title>
	<author>Tolkien</author>
	<datestamp>1257084900000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Unless they nail it on the first go.<nobr> <wbr></nobr>:)</htmltext>
<tokenext>Unless they nail it on the first go .
: )</tokentext>
<sentencetext>Unless they nail it on the first go.
:)</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149716</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151196</id>
	<title>This is silly</title>
	<author>Lord\_Jeremy</author>
	<datestamp>1257082020000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext>Seriously, this whole article sounds like a load of horsebull. As far as I know, things like RSA and AES use integer math for the encryption and decryption schemes. It therefore doesn't make much sense to use a product designed for large numbers of floating point operations, as I would imagine the PS3 is. I'm actually pretty curious how many GMIPS the PS3 can perform. In any case, why would they pay for a device that contains all sorts of hardware ancillary to the core processing task. For instance, any gaming system is going to have a fairly powerful GPU, as well as extraneous RAM and sound hardware, etc. Also, in terms of the 4 million passwords or keys or whatever per second, I just wrote a very minimalist C program to try cracking passwords on an encrypted disk image I just created and it was definitely not reaching 4 million tries a second on my Core 2 Quad...</htmltext>
<tokenext>Seriously , this whole article sounds like a load of horsebull .
As far as I know , things like RSA and AES use integer math for the encryption and decryption schemes .
It therefore does n't make much sense to use a product designed for large numbers of floating point operations , as I would imagine the PS3 is .
I 'm actually pretty curious how many GMIPS the PS3 can perform .
In any case , why would they pay for a device that contains all sorts of hardware ancillary to the core processing task .
For instance , any gaming system is going to have a fairly powerful GPU , as well as extraneous RAM and sound hardware , etc .
Also , in terms of the 4 million passwords or keys or whatever per second , I just wrote a very minimalist C program to try cracking passwords on an encrypted disk image I just created and it was definitely not reaching 4 million tries a second on my Core 2 Quad.. .</tokentext>
<sentencetext>Seriously, this whole article sounds like a load of horsebull.
As far as I know, things like RSA and AES use integer math for the encryption and decryption schemes.
It therefore doesn't make much sense to use a product designed for large numbers of floating point operations, as I would imagine the PS3 is.
I'm actually pretty curious how many GMIPS the PS3 can perform.
In any case, why would they pay for a device that contains all sorts of hardware ancillary to the core processing task.
For instance, any gaming system is going to have a fairly powerful GPU, as well as extraneous RAM and sound hardware, etc.
Also, in terms of the 4 million passwords or keys or whatever per second, I just wrote a very minimalist C program to try cracking passwords on an encrypted disk image I just created and it was definitely not reaching 4 million tries a second on my Core 2 Quad...</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149758</id>
	<title>We Are Using PS3 For</title>
	<author>Anonymous</author>
	<datestamp>1257075120000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><a href="http://scholar.google.com/scholar?cluster=16389644925774565872&amp;hl=en&amp;as\_sdt=2000" title="google.com" rel="nofollow">Renewable Energy Simulations</a> [google.com].</p><p>Yours In Peace,<br><a href="http://www.youtube.com/watch?v=b49Iwfp8U-U" title="youtube.com" rel="nofollow">Kim Jong iL</a> [youtube.com]</p></htmltext>
<tokenext>Renewable Energy Simulations [ google.com ] .Yours In Peace,Kim Jong iL [ youtube.com ]</tokentext>
<sentencetext>Renewable Energy Simulations [google.com].Yours In Peace,Kim Jong iL [youtube.com]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151274</id>
	<title>No longer possible with the PS3 Slim...</title>
	<author>PinchDuck</author>
	<datestamp>1257082500000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>which is too bad. You can no longer install linux on it. I keep hoping (against hope) that Sony will release the full SDK and really allow people to use the power of the Cell. Throw us hobbyists some love, Sony. Tell us what we gotta do.</p></htmltext>
<tokenext>which is too bad .
You can no longer install linux on it .
I keep hoping ( against hope ) that Sony will release the full SDK and really allow people to use the power of the Cell .
Throw us hobbyists some love , Sony .
Tell us what we got ta do .</tokentext>
<sentencetext>which is too bad.
You can no longer install linux on it.
I keep hoping (against hope) that Sony will release the full SDK and really allow people to use the power of the Cell.
Throw us hobbyists some love, Sony.
Tell us what we gotta do.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30154752</id>
	<title>Re:Nvidia 8800GT PS3</title>
	<author>jcupitt65</author>
	<datestamp>1258636440000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I can't find any single-precision performance numbers for a modern cpu, but I'd bet that they easily outclass PS3s too.</p><p>It depends on the benchmark. The IBM whitepapers on the Cell have a matrix multiplication program which (after quite a bit of tuning) went just over 200 gflops. A Core2Duo has a theoretical peak of about 15 gflops.

</p><p>Of course the C2D will be much faster than the Cell with most general programs, but with math that parallelises well and that you spend some time hand-tuning, the Cell can be very quick.</p></htmltext>
<tokenext>I ca n't find any single-precision performance numbers for a modern cpu , but I 'd bet that they easily outclass PS3s too.It depends on the benchmark .
The IBM whitepapers on the Cell have a matrix multiplication program which ( after quite a bit of tuning ) went just over 200 gflops .
A Core2Duo has a theoretical peak of about 15 gflops .
Of course the C2D will be much faster than the Cell with most general programs , but with math that parallelises well and that you spend some time hand-tuning , the Cell can be very quick .</tokentext>
<sentencetext>I can't find any single-precision performance numbers for a modern cpu, but I'd bet that they easily outclass PS3s too.It depends on the benchmark.
The IBM whitepapers on the Cell have a matrix multiplication program which (after quite a bit of tuning) went just over 200 gflops.
A Core2Duo has a theoretical peak of about 15 gflops.
Of course the C2D will be much faster than the Cell with most general programs, but with math that parallelises well and that you spend some time hand-tuning, the Cell can be very quick.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30154002</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30157946</id>
	<title>Re:Trust me.</title>
	<author>neurovish</author>
	<datestamp>1258651200000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><blockquote><div><p>Naturally this is only being used to break encryption on computers seized with a warrant and suspected of harboring child pornography.</p></div></blockquote><p>That is the only thing they use them for... Wink, wink, nudge, nudge, Know what I mean?</p></div><p>The ps3s are really going to be used to have sex with a lady?  How may I use them to this ends?</p><p>...do you have a newsletter?</p></div>
	</htmltext>
<tokenext>Naturally this is only being used to break encryption on computers seized with a warrant and suspected of harboring child pornography.That is the only thing they use them for... Wink , wink , nudge , nudge , Know what I mean ? The ps3s are really going to be used to have sex with a lady ?
How may I use them to this ends ? ...do you have a newsletter ?</tokentext>
<sentencetext>Naturally this is only being used to break encryption on computers seized with a warrant and suspected of harboring child pornography.That is the only thing they use them for... Wink, wink, nudge, nudge, Know what I mean?The ps3s are really going to be used to have sex with a lady?
How may I use them to this ends?...do you have a newsletter?
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149628</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30154078</id>
	<title>To quote Spock...</title>
	<author>petrus4</author>
	<datestamp>1258625280000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>"Fascinating."</p><p>I honestly had no idea that government was capable of thinking this far outside the box.  This is cause for either great optimism, or equal fear, depending on your perspective.</p></htmltext>
<tokenext>" Fascinating .
" I honestly had no idea that government was capable of thinking this far outside the box .
This is cause for either great optimism , or equal fear , depending on your perspective .</tokentext>
<sentencetext>"Fascinating.
"I honestly had no idea that government was capable of thinking this far outside the box.
This is cause for either great optimism, or equal fear, depending on your perspective.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30155380</id>
	<title>break in to PLANT false evidence possible?</title>
	<author>Anonymous</author>
	<datestamp>1258642080000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>it's not just finding out what's on a pc that's a worry. they could plant child porn just as easily. indict the target. BLAMMO! you are now a child molester and THEY have PROOF.</p></htmltext>
<tokenext>it 's not just finding out what 's on a pc that 's a worry .
they could plant child porn just as easily .
indict the target .
BLAMMO ! you are now a child molester and THEY have PROOF .</tokentext>
<sentencetext>it's not just finding out what's on a pc that's a worry.
they could plant child porn just as easily.
indict the target.
BLAMMO! you are now a child molester and THEY have PROOF.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150746</id>
	<title>Re:Wow, 4 million passwords per second...</title>
	<author>noidentity</author>
	<datestamp>1257079560000</datestamp>
	<modclass>Funny</modclass>
	<modscore>4</modscore>
	<htmltext><blockquote><div><p>So, with a brute force attack, I've only got 36,030,233,524,592,808,479,552,335 years before they will reach mine!</p></div>
</blockquote><p>Thanks, we'll just skip ahead to the password we would have be trying 36,030,233,524,592,808,479,552,335 years from now, and crack your encryption today!</p></div>
	</htmltext>
<tokenext>So , with a brute force attack , I 've only got 36,030,233,524,592,808,479,552,335 years before they will reach mine !
Thanks , we 'll just skip ahead to the password we would have be trying 36,030,233,524,592,808,479,552,335 years from now , and crack your encryption today !</tokentext>
<sentencetext>So, with a brute force attack, I've only got 36,030,233,524,592,808,479,552,335 years before they will reach mine!
Thanks, we'll just skip ahead to the password we would have be trying 36,030,233,524,592,808,479,552,335 years from now, and crack your encryption today!
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149716</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150282</id>
	<title>PS3-slim</title>
	<author>mathfeel</author>
	<datestamp>1257077160000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Is this why SONY introduced the slim? Some <em>company</em> scooping up a large number of PS3, on each Sony takes a loss on, for computation purpose with no intend of buying game?
<br> <br>
They could have just asked Red Octane to release "Child Porn Encryption Hero".</htmltext>
<tokenext>Is this why SONY introduced the slim ?
Some company scooping up a large number of PS3 , on each Sony takes a loss on , for computation purpose with no intend of buying game ?
They could have just asked Red Octane to release " Child Porn Encryption Hero " .</tokentext>
<sentencetext>Is this why SONY introduced the slim?
Some company scooping up a large number of PS3, on each Sony takes a loss on, for computation purpose with no intend of buying game?
They could have just asked Red Octane to release "Child Porn Encryption Hero".</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149858</id>
	<title>imagine</title>
	<author>trb</author>
	<datestamp>1257075540000</datestamp>
	<modclass>Redundant</modclass>
	<modscore>0</modscore>
	<htmltext>Imagine a Beowulf cluster of these.</htmltext>
<tokenext>Imagine a Beowulf cluster of these .</tokentext>
<sentencetext>Imagine a Beowulf cluster of these.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150836</id>
	<title>Re:Nit-picking the article</title>
	<author>Anonymous</author>
	<datestamp>1257079980000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Have to post this anonymously, but at the fortune 500 where i'm employed, our passwords are a minimum of 8 characters.  They are also a MAXIMUM of 8 characters.</p></htmltext>
<tokenext>Have to post this anonymously , but at the fortune 500 where i 'm employed , our passwords are a minimum of 8 characters .
They are also a MAXIMUM of 8 characters .</tokentext>
<sentencetext>Have to post this anonymously, but at the fortune 500 where i'm employed, our passwords are a minimum of 8 characters.
They are also a MAXIMUM of 8 characters.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149718</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153452</id>
	<title>Re:Nit-picking the article</title>
	<author>Anonymous</author>
	<datestamp>1257102840000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Not much above 84 characters? Unless the computer character set happens to be in Chinese. Then you may be looking at about 4000 unique characters to choose from (theoretically). Possibly more.</p><p>Just sayin'...</p></htmltext>
<tokenext>Not much above 84 characters ?
Unless the computer character set happens to be in Chinese .
Then you may be looking at about 4000 unique characters to choose from ( theoretically ) .
Possibly more.Just sayin'.. .</tokentext>
<sentencetext>Not much above 84 characters?
Unless the computer character set happens to be in Chinese.
Then you may be looking at about 4000 unique characters to choose from (theoretically).
Possibly more.Just sayin'...</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149718</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151304</id>
	<title>compromised systems</title>
	<author>Anonymous</author>
	<datestamp>1257082620000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>how do they prove that the owner of the computer put the child porn on the system?</p><p>Just like many warez groups and pedo groups they use technology to house their "goods" on systems with exploits.</p></htmltext>
<tokenext>how do they prove that the owner of the computer put the child porn on the system ? Just like many warez groups and pedo groups they use technology to house their " goods " on systems with exploits .</tokentext>
<sentencetext>how do they prove that the owner of the computer put the child porn on the system?Just like many warez groups and pedo groups they use technology to house their "goods" on systems with exploits.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150822</id>
	<title>Sony is protecting consumers!!</title>
	<author>tnmc</author>
	<datestamp>1257079920000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>This must be why the 3rd party OS option was removed from the Playstation Slim!  SONY *loves* them some customers!  {cough}</p></htmltext>
<tokenext>This must be why the 3rd party OS option was removed from the Playstation Slim !
SONY * loves * them some customers !
{ cough }</tokentext>
<sentencetext>This must be why the 3rd party OS option was removed from the Playstation Slim!
SONY *loves* them some customers!
{cough}</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30161146</id>
	<title>What type of crypto?</title>
	<author>Bert64</author>
	<datestamp>1258661100000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>The article doesn't say what type of encryption they are trying to crack...<br>I assume it's only a fairly limited number of well known encryption programs they target with this, and by using something else you could avoid their attacks quite easily, at least until they implement support for it.</p></htmltext>
<tokenext>The article does n't say what type of encryption they are trying to crack...I assume it 's only a fairly limited number of well known encryption programs they target with this , and by using something else you could avoid their attacks quite easily , at least until they implement support for it .</tokentext>
<sentencetext>The article doesn't say what type of encryption they are trying to crack...I assume it's only a fairly limited number of well known encryption programs they target with this, and by using something else you could avoid their attacks quite easily, at least until they implement support for it.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30154002</id>
	<title>Re:Nvidia 8800GT PS3</title>
	<author>TheThiefMaster</author>
	<datestamp>1258623840000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>The Cell (at least the usable portion) is less than twice as powerful as the xbox 360's tri-core cpu. The gpu is weaker than the 360's, and it is slightly more powerful than the cell, but even harder to program for. Overall, both consoles have a similar theoretical performance.</p><p>The cpu+gpu put together in either one are still outclassed by just your 8800GT, let alone a modern gpu (the GTX 285 is single-chip and readily available, and 3-4x as powerful as your 8800). This is all working in single-precision, and I can't find any single-precision performance numbers for a modern cpu, but I'd bet that they easily outclass PS3s too.</p><p>Though the article makes it sound like they chose PS3s for their performance/cost ratio, so the fact that it doesn't have top-end outright performance is perhaps irrelevant to them. I still think they should have got a cell-chip-based blade server, using the double-precision version of the cell chip (which is not the one that's in the PS3), and probably would have access to two more SPUs (the PS3 reserves one for OS and has one disabled for yeild) per cell chip. Knowing reporting these days, that's probably what they did get.</p></htmltext>
<tokenext>The Cell ( at least the usable portion ) is less than twice as powerful as the xbox 360 's tri-core cpu .
The gpu is weaker than the 360 's , and it is slightly more powerful than the cell , but even harder to program for .
Overall , both consoles have a similar theoretical performance.The cpu + gpu put together in either one are still outclassed by just your 8800GT , let alone a modern gpu ( the GTX 285 is single-chip and readily available , and 3-4x as powerful as your 8800 ) .
This is all working in single-precision , and I ca n't find any single-precision performance numbers for a modern cpu , but I 'd bet that they easily outclass PS3s too.Though the article makes it sound like they chose PS3s for their performance/cost ratio , so the fact that it does n't have top-end outright performance is perhaps irrelevant to them .
I still think they should have got a cell-chip-based blade server , using the double-precision version of the cell chip ( which is not the one that 's in the PS3 ) , and probably would have access to two more SPUs ( the PS3 reserves one for OS and has one disabled for yeild ) per cell chip .
Knowing reporting these days , that 's probably what they did get .</tokentext>
<sentencetext>The Cell (at least the usable portion) is less than twice as powerful as the xbox 360's tri-core cpu.
The gpu is weaker than the 360's, and it is slightly more powerful than the cell, but even harder to program for.
Overall, both consoles have a similar theoretical performance.The cpu+gpu put together in either one are still outclassed by just your 8800GT, let alone a modern gpu (the GTX 285 is single-chip and readily available, and 3-4x as powerful as your 8800).
This is all working in single-precision, and I can't find any single-precision performance numbers for a modern cpu, but I'd bet that they easily outclass PS3s too.Though the article makes it sound like they chose PS3s for their performance/cost ratio, so the fact that it doesn't have top-end outright performance is perhaps irrelevant to them.
I still think they should have got a cell-chip-based blade server, using the double-precision version of the cell chip (which is not the one that's in the PS3), and probably would have access to two more SPUs (the PS3 reserves one for OS and has one disabled for yeild) per cell chip.
Knowing reporting these days, that's probably what they did get.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150436</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30165070</id>
	<title>Re:Hmmmm</title>
	<author>Anonymous</author>
	<datestamp>1258630680000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Two gifts, first I give you <a href="http://www.lastpass.com/" title="lastpass.com" rel="nofollow">LastPass</a> [lastpass.com], and second <a href="http://www.yubico.com/" title="yubico.com" rel="nofollow">Yubico</a> [yubico.com] and their YubiKey product.  LastPass coincidentally supports the Yubikey (if you pay the $12/year for the premium service).</p></htmltext>
<tokenext>Two gifts , first I give you LastPass [ lastpass.com ] , and second Yubico [ yubico.com ] and their YubiKey product .
LastPass coincidentally supports the Yubikey ( if you pay the $ 12/year for the premium service ) .</tokentext>
<sentencetext>Two gifts, first I give you LastPass [lastpass.com], and second Yubico [yubico.com] and their YubiKey product.
LastPass coincidentally supports the Yubikey (if you pay the $12/year for the premium service).</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150566</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149538</id>
	<title>Don't forget the terrorists!</title>
	<author>Anonymous</author>
	<datestamp>1257074340000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>Naturally this is only being used to break encryption on computers seized with a warrant and suspected of harboring child pornography."</p></div><p>What about those computers seized with a warrant and suspected of harboring stored communications with terrorists?  Are we going to just ignore them??  Huh??? Huh????</p></div>
	</htmltext>
<tokenext>Naturally this is only being used to break encryption on computers seized with a warrant and suspected of harboring child pornography .
" What about those computers seized with a warrant and suspected of harboring stored communications with terrorists ?
Are we going to just ignore them ? ?
Huh ? ? ? Huh ? ? ?
?</tokentext>
<sentencetext>Naturally this is only being used to break encryption on computers seized with a warrant and suspected of harboring child pornography.
"What about those computers seized with a warrant and suspected of harboring stored communications with terrorists?
Are we going to just ignore them??
Huh??? Huh???
?
	</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149958</id>
	<title>Terrible story. PR fluff, with several errors:</title>
	<author>Anonymous</author>
	<datestamp>1257075900000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Firstly, basic error: it's not going to be 256^6. That's six bytes, not six characters. But your passphrase very, very probably does not contain zero-bytes, and very probably not control characters. Entropy of passphrases is almost always quite a lot less than 8 bits per character. And you try common dictionary attacks first of course, which is what this is <i>really</i> used for. Or Rainbow table generation.</p><p>Secondly, the use of PS3 in crypto attacks is not news; most of the massively-parallel crypto/computational stuff Cell was aimed at in the workstation sector actually ended up causing labs to buy hundreds of cheap commodity PS3s instead, which ended up being way more cost-effective than the overpriced Cell workstations, with only one more SPU each. The MD5 SSL "tunneled" collisions were calculated using a 200-strong PS3 cluster, for example.</p><p>It's rather unfortunate the "Other OS" thing was taken out for the slim, because running using less power and heat would have been helpful for clusters, as AccessData points out in the article.</p><p>However, they've now fallen somewhat behind, because modern graphics cards (see ElcomSoft's recent work, for example) can use CUDA or various shaders to get quite a <i>lot</i> more power for exactly this kind of computation, and it's made the PS3 approach almost obsolete overnight. A PS3 Cell can push about 20 GigaFLOPs, optimally (source: Folding@home). Impressive when it came out. But a fast quadcore CPU today is 70 GigaFLOPs. And your &pound;150 4870 X2 not only plays a mean game, in the right circumstances it's <i>30-100 times</i> faster at password cracking than a PS3 Cell. You could buy just one ordinary gaming PC, put a couple of 4870 X2s in it, like I don't doubt many of us have, and clean the clock of this entire 60 PS3 cluster, for a fraction of the price and running cost. And, the extremely rapid rate of development in graphics card technology means it's getting faster, rapidly (the R800 is about 3000 GigaFLOPs).</p><p>Thirdly, this attack is totally, stunningly ineffective against a good passphrase, which anyone who'd done their homework, or read the documentation of the crypto software, would know to use. A 6-word random "Diceware" (google it) passphrase (or the equivalent, roughly 16 randomly-chosen lower-case letters) wouldn't be crackable with anything of this magnitude in the next few years, making such an attack impractical. 10 random Diceware words (or a 22 alphanumeric mixed-case passphrase, or 28 lower-case letters) would get you over 128 bits of entropy and make any attack of this kind beyond anyone's reach for the foreseeable future.</p><p>Fourthly, because of the above, a dumb brute force attack like this, after the fact on hard drives you've seized, is decidedly the wrong way to do it. The <i>right</i> way to do it is to get a bugging warrant and plant a hardware keylogger or observe the passphrase being entered, <i>then</i> seize the hard drive. That's what the FBI do when they're actually being serious, say with Mafia bosses. (Or coercion, but there's the 4th Amendment barrier to law enforcement doing that.)</p><p>Fifthly, it mentions paedophiles for apparently very little actual reason. Brass Eye moment, right there. It's a transparent appeal to emotion used to grab headlines with little actual substance. I don't actually see where it mentions any convictions as a result of this. (That's odd, surely you'd be crowing about successfully bringing child molesters to justice if there were any successes, wouldn't you?) And, this isn't the FBI in this article, this is ICE. Odd, again; surely the wrong agency for child protection work? Is there a point to this other than to say that ICE just bought 40 PS3s off eBay? 60 PS3s, as I said above, ain't gonna get you far.</p><p>And finally, the dude says "There's no controllers hooked up". I'd just like to point out that that does <i>not</i> say they're not playing them; PlayStation&#174;3 controllers are <i>wireless</i>, so almost by definition, unless you're charging them... they're not hooked up. Hmm. Now if there were no <i>monitors</i> hooked up, maybe then I wouldn't be so sceptical...<nobr> <wbr></nobr>:)</p></htmltext>
<tokenext>Firstly , basic error : it 's not going to be 256 ^ 6 .
That 's six bytes , not six characters .
But your passphrase very , very probably does not contain zero-bytes , and very probably not control characters .
Entropy of passphrases is almost always quite a lot less than 8 bits per character .
And you try common dictionary attacks first of course , which is what this is really used for .
Or Rainbow table generation.Secondly , the use of PS3 in crypto attacks is not news ; most of the massively-parallel crypto/computational stuff Cell was aimed at in the workstation sector actually ended up causing labs to buy hundreds of cheap commodity PS3s instead , which ended up being way more cost-effective than the overpriced Cell workstations , with only one more SPU each .
The MD5 SSL " tunneled " collisions were calculated using a 200-strong PS3 cluster , for example.It 's rather unfortunate the " Other OS " thing was taken out for the slim , because running using less power and heat would have been helpful for clusters , as AccessData points out in the article.However , they 've now fallen somewhat behind , because modern graphics cards ( see ElcomSoft 's recent work , for example ) can use CUDA or various shaders to get quite a lot more power for exactly this kind of computation , and it 's made the PS3 approach almost obsolete overnight .
A PS3 Cell can push about 20 GigaFLOPs , optimally ( source : Folding @ home ) .
Impressive when it came out .
But a fast quadcore CPU today is 70 GigaFLOPs .
And your   150 4870 X2 not only plays a mean game , in the right circumstances it 's 30-100 times faster at password cracking than a PS3 Cell .
You could buy just one ordinary gaming PC , put a couple of 4870 X2s in it , like I do n't doubt many of us have , and clean the clock of this entire 60 PS3 cluster , for a fraction of the price and running cost .
And , the extremely rapid rate of development in graphics card technology means it 's getting faster , rapidly ( the R800 is about 3000 GigaFLOPs ) .Thirdly , this attack is totally , stunningly ineffective against a good passphrase , which anyone who 'd done their homework , or read the documentation of the crypto software , would know to use .
A 6-word random " Diceware " ( google it ) passphrase ( or the equivalent , roughly 16 randomly-chosen lower-case letters ) would n't be crackable with anything of this magnitude in the next few years , making such an attack impractical .
10 random Diceware words ( or a 22 alphanumeric mixed-case passphrase , or 28 lower-case letters ) would get you over 128 bits of entropy and make any attack of this kind beyond anyone 's reach for the foreseeable future.Fourthly , because of the above , a dumb brute force attack like this , after the fact on hard drives you 've seized , is decidedly the wrong way to do it .
The right way to do it is to get a bugging warrant and plant a hardware keylogger or observe the passphrase being entered , then seize the hard drive .
That 's what the FBI do when they 're actually being serious , say with Mafia bosses .
( Or coercion , but there 's the 4th Amendment barrier to law enforcement doing that .
) Fifthly , it mentions paedophiles for apparently very little actual reason .
Brass Eye moment , right there .
It 's a transparent appeal to emotion used to grab headlines with little actual substance .
I do n't actually see where it mentions any convictions as a result of this .
( That 's odd , surely you 'd be crowing about successfully bringing child molesters to justice if there were any successes , would n't you ?
) And , this is n't the FBI in this article , this is ICE .
Odd , again ; surely the wrong agency for child protection work ?
Is there a point to this other than to say that ICE just bought 40 PS3s off eBay ?
60 PS3s , as I said above , ai n't gon na get you far.And finally , the dude says " There 's no controllers hooked up " .
I 'd just like to point out that that does not say they 're not playing them ; PlayStation   3 controllers are wireless , so almost by definition , unless you 're charging them... they 're not hooked up .
Hmm. Now if there were no monitors hooked up , maybe then I would n't be so sceptical... : )</tokentext>
<sentencetext>Firstly, basic error: it's not going to be 256^6.
That's six bytes, not six characters.
But your passphrase very, very probably does not contain zero-bytes, and very probably not control characters.
Entropy of passphrases is almost always quite a lot less than 8 bits per character.
And you try common dictionary attacks first of course, which is what this is really used for.
Or Rainbow table generation.Secondly, the use of PS3 in crypto attacks is not news; most of the massively-parallel crypto/computational stuff Cell was aimed at in the workstation sector actually ended up causing labs to buy hundreds of cheap commodity PS3s instead, which ended up being way more cost-effective than the overpriced Cell workstations, with only one more SPU each.
The MD5 SSL "tunneled" collisions were calculated using a 200-strong PS3 cluster, for example.It's rather unfortunate the "Other OS" thing was taken out for the slim, because running using less power and heat would have been helpful for clusters, as AccessData points out in the article.However, they've now fallen somewhat behind, because modern graphics cards (see ElcomSoft's recent work, for example) can use CUDA or various shaders to get quite a lot more power for exactly this kind of computation, and it's made the PS3 approach almost obsolete overnight.
A PS3 Cell can push about 20 GigaFLOPs, optimally (source: Folding@home).
Impressive when it came out.
But a fast quadcore CPU today is 70 GigaFLOPs.
And your £150 4870 X2 not only plays a mean game, in the right circumstances it's 30-100 times faster at password cracking than a PS3 Cell.
You could buy just one ordinary gaming PC, put a couple of 4870 X2s in it, like I don't doubt many of us have, and clean the clock of this entire 60 PS3 cluster, for a fraction of the price and running cost.
And, the extremely rapid rate of development in graphics card technology means it's getting faster, rapidly (the R800 is about 3000 GigaFLOPs).Thirdly, this attack is totally, stunningly ineffective against a good passphrase, which anyone who'd done their homework, or read the documentation of the crypto software, would know to use.
A 6-word random "Diceware" (google it) passphrase (or the equivalent, roughly 16 randomly-chosen lower-case letters) wouldn't be crackable with anything of this magnitude in the next few years, making such an attack impractical.
10 random Diceware words (or a 22 alphanumeric mixed-case passphrase, or 28 lower-case letters) would get you over 128 bits of entropy and make any attack of this kind beyond anyone's reach for the foreseeable future.Fourthly, because of the above, a dumb brute force attack like this, after the fact on hard drives you've seized, is decidedly the wrong way to do it.
The right way to do it is to get a bugging warrant and plant a hardware keylogger or observe the passphrase being entered, then seize the hard drive.
That's what the FBI do when they're actually being serious, say with Mafia bosses.
(Or coercion, but there's the 4th Amendment barrier to law enforcement doing that.
)Fifthly, it mentions paedophiles for apparently very little actual reason.
Brass Eye moment, right there.
It's a transparent appeal to emotion used to grab headlines with little actual substance.
I don't actually see where it mentions any convictions as a result of this.
(That's odd, surely you'd be crowing about successfully bringing child molesters to justice if there were any successes, wouldn't you?
) And, this isn't the FBI in this article, this is ICE.
Odd, again; surely the wrong agency for child protection work?
Is there a point to this other than to say that ICE just bought 40 PS3s off eBay?
60 PS3s, as I said above, ain't gonna get you far.And finally, the dude says "There's no controllers hooked up".
I'd just like to point out that that does not say they're not playing them; PlayStation®3 controllers are wireless, so almost by definition, unless you're charging them... they're not hooked up.
Hmm. Now if there were no monitors hooked up, maybe then I wouldn't be so sceptical... :)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150324</id>
	<title>Re:Call me paranoid, but</title>
	<author>Anonymous</author>
	<datestamp>1257077340000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><div class="quote"><p><div class="quote"><p>Naturally this is only being used to break encryption on computers seized with a warrant and suspected of harboring child pornography.</p></div><p>... suuuuuure.</p></div><p>I assume you're balking at just the warrant part, since any computer with some form of secondary storage or network connection can be <i>suspected</i> of "harboring" child pornography.</p></div>
	</htmltext>
<tokenext>Naturally this is only being used to break encryption on computers seized with a warrant and suspected of harboring child pornography.... suuuuuure.I assume you 're balking at just the warrant part , since any computer with some form of secondary storage or network connection can be suspected of " harboring " child pornography .</tokentext>
<sentencetext>Naturally this is only being used to break encryption on computers seized with a warrant and suspected of harboring child pornography.... suuuuuure.I assume you're balking at just the warrant part, since any computer with some form of secondary storage or network connection can be suspected of "harboring" child pornography.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149546</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150402</id>
	<title>Re:This is important people, it's for CHILD PORN</title>
	<author>Anonymous</author>
	<datestamp>1257077760000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>It is a well known FACT, sir, an undeniable FACT that is backed by experts, that TERRORISM is funded by child pornography and software piracy. While we all stand arm in arm, certain harmful and degenerate elements stand out here on slashdot, advocating for the molestation of innocent children, like yours or mine, or theft of the common daily bread from the fair and honest folks at Warner or Sony, all while fueling their sinister plots of murder and hatred. </p><p>All those elements need to know that the american people will not and never will turn a blind eye to the abuse of children or theft of intellectual property, and only those who have something to hide would choose to hide it! Therefor it is immediately obvious that decrypting the data is not required to convict the terrorist, but only to prove additional charges.<br><br>P.S. I'm not americanish, but I think I'm doing good?</p></htmltext>
<tokenext>It is a well known FACT , sir , an undeniable FACT that is backed by experts , that TERRORISM is funded by child pornography and software piracy .
While we all stand arm in arm , certain harmful and degenerate elements stand out here on slashdot , advocating for the molestation of innocent children , like yours or mine , or theft of the common daily bread from the fair and honest folks at Warner or Sony , all while fueling their sinister plots of murder and hatred .
All those elements need to know that the american people will not and never will turn a blind eye to the abuse of children or theft of intellectual property , and only those who have something to hide would choose to hide it !
Therefor it is immediately obvious that decrypting the data is not required to convict the terrorist , but only to prove additional charges.P.S .
I 'm not americanish , but I think I 'm doing good ?</tokentext>
<sentencetext>It is a well known FACT, sir, an undeniable FACT that is backed by experts, that TERRORISM is funded by child pornography and software piracy.
While we all stand arm in arm, certain harmful and degenerate elements stand out here on slashdot, advocating for the molestation of innocent children, like yours or mine, or theft of the common daily bread from the fair and honest folks at Warner or Sony, all while fueling their sinister plots of murder and hatred.
All those elements need to know that the american people will not and never will turn a blind eye to the abuse of children or theft of intellectual property, and only those who have something to hide would choose to hide it!
Therefor it is immediately obvious that decrypting the data is not required to convict the terrorist, but only to prove additional charges.P.S.
I'm not americanish, but I think I'm doing good?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149946</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150650</id>
	<title>Big bad lawyers fron Sony</title>
	<author>Anonymous</author>
	<datestamp>1257079020000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Surely to load custom code on these PS3, they must penetrate the console DRM. Didn't Sony sued people for doing this sort of things?</p></htmltext>
<tokenext>Surely to load custom code on these PS3 , they must penetrate the console DRM .
Did n't Sony sued people for doing this sort of things ?</tokentext>
<sentencetext>Surely to load custom code on these PS3, they must penetrate the console DRM.
Didn't Sony sued people for doing this sort of things?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151486</id>
	<title>Re:And the problem with this is???</title>
	<author>CronoCloud</author>
	<datestamp>1257083760000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>It is, at least for certain kinds of work.  Remember that Folding@home broke the petaflop barrier because of the PS3's contributions.  While the GPU's are powerful, they don't have the versatility i nthe kinds of work units they can handle as the PS3 can.</p></htmltext>
<tokenext>It is , at least for certain kinds of work .
Remember that Folding @ home broke the petaflop barrier because of the PS3 's contributions .
While the GPU 's are powerful , they do n't have the versatility i nthe kinds of work units they can handle as the PS3 can .</tokentext>
<sentencetext>It is, at least for certain kinds of work.
Remember that Folding@home broke the petaflop barrier because of the PS3's contributions.
While the GPU's are powerful, they don't have the versatility i nthe kinds of work units they can handle as the PS3 can.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150036</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150688</id>
	<title>Re:What</title>
	<author>Anonymous</author>
	<datestamp>1257079260000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>What if they are using plain text entry?<br>Remember we all type a plain text password that transparently unlocks the encyption algorythm</p><p>These systems are seized and phyically possessed tn the case of encrypted files, unlike system authentication there is not protection from,<br>Delay login attempts and maximum login failures<br>That creates a static per second figure until.</p><p>The PS3 can type upto 4 million passwords in chosen Brute force attack to decrypt a file,  baseline attack accending characters for example a then aa then try aaa aaaa etc</p></htmltext>
<tokenext>What if they are using plain text entry ? Remember we all type a plain text password that transparently unlocks the encyption algorythmThese systems are seized and phyically possessed tn the case of encrypted files , unlike system authentication there is not protection from,Delay login attempts and maximum login failuresThat creates a static per second figure until.The PS3 can type upto 4 million passwords in chosen Brute force attack to decrypt a file , baseline attack accending characters for example a then aa then try aaa aaaa etc</tokentext>
<sentencetext>What if they are using plain text entry?Remember we all type a plain text password that transparently unlocks the encyption algorythmThese systems are seized and phyically possessed tn the case of encrypted files, unlike system authentication there is not protection from,Delay login attempts and maximum login failuresThat creates a static per second figure until.The PS3 can type upto 4 million passwords in chosen Brute force attack to decrypt a file,  baseline attack accending characters for example a then aa then try aaa aaaa etc</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149622</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150220</id>
	<title>Re:Lovely encryption</title>
	<author>mdwh2</author>
	<datestamp>1257076860000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Indeed. They're way behind the UK Government though - who needs PS3s, when they can just make it illegal for someone to not decrypt any files they find...</p></htmltext>
<tokenext>Indeed .
They 're way behind the UK Government though - who needs PS3s , when they can just make it illegal for someone to not decrypt any files they find.. .</tokentext>
<sentencetext>Indeed.
They're way behind the UK Government though - who needs PS3s, when they can just make it illegal for someone to not decrypt any files they find...</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149658</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152242</id>
	<title>Re:How does this work?</title>
	<author>Anonymous</author>
	<datestamp>1257088920000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>You generally don't need to log into an OS to get at the data on the disk.  You plug it into a computer with your OS of choice already installed on it, then use that OS to access the suspect disk.</p><p>The "if $x bad logins, then lock" scenario is imposed by the OS, not by the disk.</p></htmltext>
<tokenext>You generally do n't need to log into an OS to get at the data on the disk .
You plug it into a computer with your OS of choice already installed on it , then use that OS to access the suspect disk.The " if $ x bad logins , then lock " scenario is imposed by the OS , not by the disk .</tokentext>
<sentencetext>You generally don't need to log into an OS to get at the data on the disk.
You plug it into a computer with your OS of choice already installed on it, then use that OS to access the suspect disk.The "if $x bad logins, then lock" scenario is imposed by the OS, not by the disk.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150456</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150512</id>
	<title>still doesn't matter</title>
	<author>Anonymous</author>
	<datestamp>1257078240000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>even if they had the top500 supercomputers dedicated to breaking an encryption key, its still going to take a few thousand times the age of the universe to check every possible key. not to mention all the energy requirements. 30GW-years just to generate all possible keys in the 128-bit key space assuming you'r at the limit of what is possible and operating at 300K. and then many many times that to actually perform the checks.</p><p>also, why use PS3's when you can buy up some cell servers and chuck some CUDA capable graphics cards in for some real crazy power.</p><p>Now, when we get some quantum computers capable of performing at a useful level then i might worry. but by then we'll have quantum encryption or something which will be nice and secure.</p></htmltext>
<tokenext>even if they had the top500 supercomputers dedicated to breaking an encryption key , its still going to take a few thousand times the age of the universe to check every possible key .
not to mention all the energy requirements .
30GW-years just to generate all possible keys in the 128-bit key space assuming you'r at the limit of what is possible and operating at 300K .
and then many many times that to actually perform the checks.also , why use PS3 's when you can buy up some cell servers and chuck some CUDA capable graphics cards in for some real crazy power.Now , when we get some quantum computers capable of performing at a useful level then i might worry .
but by then we 'll have quantum encryption or something which will be nice and secure .</tokentext>
<sentencetext>even if they had the top500 supercomputers dedicated to breaking an encryption key, its still going to take a few thousand times the age of the universe to check every possible key.
not to mention all the energy requirements.
30GW-years just to generate all possible keys in the 128-bit key space assuming you'r at the limit of what is possible and operating at 300K.
and then many many times that to actually perform the checks.also, why use PS3's when you can buy up some cell servers and chuck some CUDA capable graphics cards in for some real crazy power.Now, when we get some quantum computers capable of performing at a useful level then i might worry.
but by then we'll have quantum encryption or something which will be nice and secure.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30155198</id>
	<title>Re:Hmmmm</title>
	<author>Anonymous</author>
	<datestamp>1258641060000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>However, that is the worst-case scenario.  If I remember the concept behind the so called "birthday attack" correctly (no guarantee there) it will on average only take 1.25 * sqrt(n) tries.</p><p>Thus, ON AVERAGE (assuming I'm remembering this correctly):<br>An 8 character password, letters and numbers only: ~18 minutes<br>Upper and lower case increase that figure to just over 2.5 hours (with 9 characters under 1.9 days)<br>84 character set brings us up to 8.6 hours.</p><p>However, these numbers all seem too small, so I think I must have screwed something up...</p></htmltext>
<tokenext>However , that is the worst-case scenario .
If I remember the concept behind the so called " birthday attack " correctly ( no guarantee there ) it will on average only take 1.25 * sqrt ( n ) tries.Thus , ON AVERAGE ( assuming I 'm remembering this correctly ) : An 8 character password , letters and numbers only : ~ 18 minutesUpper and lower case increase that figure to just over 2.5 hours ( with 9 characters under 1.9 days ) 84 character set brings us up to 8.6 hours.However , these numbers all seem too small , so I think I must have screwed something up.. .</tokentext>
<sentencetext>However, that is the worst-case scenario.
If I remember the concept behind the so called "birthday attack" correctly (no guarantee there) it will on average only take 1.25 * sqrt(n) tries.Thus, ON AVERAGE (assuming I'm remembering this correctly):An 8 character password, letters and numbers only: ~18 minutesUpper and lower case increase that figure to just over 2.5 hours (with 9 characters under 1.9 days)84 character set brings us up to 8.6 hours.However, these numbers all seem too small, so I think I must have screwed something up...</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150566</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153934</id>
	<title>Re:And the problem with this is???</title>
	<author>Anonymous</author>
	<datestamp>1258622940000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>The problem is that the US Federal Govt has a piss-poor history of crapping all over our rights while using our extorted tax dollars and technology against us. They consider themselves a "superior" class than we. This is why I don't believe anything some pig or politician tells me. I just don't trust anyone from the govt, therefore I use strong encryption . Crack this buttwipe.</p></htmltext>
<tokenext>The problem is that the US Federal Govt has a piss-poor history of crapping all over our rights while using our extorted tax dollars and technology against us .
They consider themselves a " superior " class than we .
This is why I do n't believe anything some pig or politician tells me .
I just do n't trust anyone from the govt , therefore I use strong encryption .
Crack this buttwipe .</tokentext>
<sentencetext>The problem is that the US Federal Govt has a piss-poor history of crapping all over our rights while using our extorted tax dollars and technology against us.
They consider themselves a "superior" class than we.
This is why I don't believe anything some pig or politician tells me.
I just don't trust anyone from the govt, therefore I use strong encryption .
Crack this buttwipe.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149794</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152558</id>
	<title>Re:How does this work?</title>
	<author>Anonymous</author>
	<datestamp>1257092100000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>You are confusing encryption with system authentication. If they have an encrypted file, they can try passwords as fast as they like on *their own* system. Don't feel bad, Hollywood makes that mistake on a regular basis.</p><p>This is likely too be used with files on confiscated hard drives. This won't work for hacking into systems, or cracking most encrypted content communicated online (as that usually uses a large key, and potentially  a passphrase).</p></htmltext>
<tokenext>You are confusing encryption with system authentication .
If they have an encrypted file , they can try passwords as fast as they like on * their own * system .
Do n't feel bad , Hollywood makes that mistake on a regular basis.This is likely too be used with files on confiscated hard drives .
This wo n't work for hacking into systems , or cracking most encrypted content communicated online ( as that usually uses a large key , and potentially a passphrase ) .</tokentext>
<sentencetext>You are confusing encryption with system authentication.
If they have an encrypted file, they can try passwords as fast as they like on *their own* system.
Don't feel bad, Hollywood makes that mistake on a regular basis.This is likely too be used with files on confiscated hard drives.
This won't work for hacking into systems, or cracking most encrypted content communicated online (as that usually uses a large key, and potentially  a passphrase).</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150456</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149546</id>
	<title>Call me paranoid, but</title>
	<author>Eudial</author>
	<datestamp>1257074340000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>4</modscore>
	<htmltext><p><div class="quote"><p>Naturally this is only being used to break encryption on computers seized with a warrant and suspected of harboring child pornography.</p></div><p>... suuuuuure.</p></div>
	</htmltext>
<tokenext>Naturally this is only being used to break encryption on computers seized with a warrant and suspected of harboring child pornography.... suuuuuure .</tokentext>
<sentencetext>Naturally this is only being used to break encryption on computers seized with a warrant and suspected of harboring child pornography.... suuuuuure.
	</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149648</id>
	<title>wait a minute...</title>
	<author>thehostiles</author>
	<datestamp>1257074760000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>could this be used on the public end as well? And if a ps3 can break encryption that well, could it make it?</htmltext>
<tokenext>could this be used on the public end as well ?
And if a ps3 can break encryption that well , could it make it ?</tokentext>
<sentencetext>could this be used on the public end as well?
And if a ps3 can break encryption that well, could it make it?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153838</id>
	<title>I'll fucking TELL you what the problem is</title>
	<author>fnj</author>
	<datestamp>1258664220000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><blockquote><div><p>Really what is the problem with this. These computers are being searched AFTER a judge issues a search warrant.</p></div></blockquote><p>Yeah.  Because if the fucking retards who run the legislature pass some outrageous bill against thought crime or victimless crime which gets signed into law by a President or Governor who is devious and pandering enough to be elected by a majority of the drooling morons who make up the voting citizenry, and then some prosecutor who has something against my politics and has the goods on some judge and gets a baseless warrant at three o'clock in the morning; then I must be guilty as Hell, right?</p></div>
	</htmltext>
<tokenext>Really what is the problem with this .
These computers are being searched AFTER a judge issues a search warrant.Yeah .
Because if the fucking retards who run the legislature pass some outrageous bill against thought crime or victimless crime which gets signed into law by a President or Governor who is devious and pandering enough to be elected by a majority of the drooling morons who make up the voting citizenry , and then some prosecutor who has something against my politics and has the goods on some judge and gets a baseless warrant at three o'clock in the morning ; then I must be guilty as Hell , right ?</tokentext>
<sentencetext>Really what is the problem with this.
These computers are being searched AFTER a judge issues a search warrant.Yeah.
Because if the fucking retards who run the legislature pass some outrageous bill against thought crime or victimless crime which gets signed into law by a President or Governor who is devious and pandering enough to be elected by a majority of the drooling morons who make up the voting citizenry, and then some prosecutor who has something against my politics and has the goods on some judge and gets a baseless warrant at three o'clock in the morning; then I must be guilty as Hell, right?
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149794</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149980</id>
	<title>Re:What</title>
	<author>Korin43</author>
	<datestamp>1257075960000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><a href="http://en.wikipedia.org/wiki/Linux\_Unified\_Key\_Setup" title="wikipedia.org">LUKS</a> [wikipedia.org]</htmltext>
<tokenext>LUKS [ wikipedia.org ]</tokentext>
<sentencetext>LUKS [wikipedia.org]</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149634</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153424</id>
	<title>Re:How does this work?</title>
	<author>Anonymous</author>
	<datestamp>1257102240000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Seems to me that a reasonable well designed OS would NOT lock after 4 password attempts. Otherwise it allows for a trivial denial of service attack.</p></htmltext>
<tokenext>Seems to me that a reasonable well designed OS would NOT lock after 4 password attempts .
Otherwise it allows for a trivial denial of service attack .</tokentext>
<sentencetext>Seems to me that a reasonable well designed OS would NOT lock after 4 password attempts.
Otherwise it allows for a trivial denial of service attack.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150456</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150172</id>
	<title>Re:Wow, 4 million passwords per second...</title>
	<author>steelfood</author>
	<datestamp>1257076620000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Depends. If you're using MD5 to verify the password that protects your stuff, you might be in trouble. Sure, that'd be looking for collisions, but all you have to do is find the right one.</p></htmltext>
<tokenext>Depends .
If you 're using MD5 to verify the password that protects your stuff , you might be in trouble .
Sure , that 'd be looking for collisions , but all you have to do is find the right one .</tokentext>
<sentencetext>Depends.
If you're using MD5 to verify the password that protects your stuff, you might be in trouble.
Sure, that'd be looking for collisions, but all you have to do is find the right one.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149716</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153410</id>
	<title>Re:And the problem with this is???</title>
	<author>Anonymous</author>
	<datestamp>1257102060000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>The submitter is clearly being sarcastic. The child pornography comment is him implying that they will use the specter of some mass hysteria-inducing crime as a justification for hacking innocent people's encrypted data.</p></htmltext>
<tokenext>The submitter is clearly being sarcastic .
The child pornography comment is him implying that they will use the specter of some mass hysteria-inducing crime as a justification for hacking innocent people 's encrypted data .</tokentext>
<sentencetext>The submitter is clearly being sarcastic.
The child pornography comment is him implying that they will use the specter of some mass hysteria-inducing crime as a justification for hacking innocent people's encrypted data.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149794</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149552</id>
	<title>This wasn't in the commercials...</title>
	<author>Romicron</author>
	<datestamp>1257074400000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Seems that the "it only does everything" slogan has greater scope than I initially thought - if "breaking encryption" was advertised explicitly, I may have picked one up...</htmltext>
<tokenext>Seems that the " it only does everything " slogan has greater scope than I initially thought - if " breaking encryption " was advertised explicitly , I may have picked one up.. .</tokentext>
<sentencetext>Seems that the "it only does everything" slogan has greater scope than I initially thought - if "breaking encryption" was advertised explicitly, I may have picked one up...</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149566</id>
	<title>Nice move Sony</title>
	<author>TheVidiot</author>
	<datestamp>1257074460000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Nice that Sony took out the ability to install Linux on the slim PS3.  How hard could it have been to have a left the feature in that is useful in a number of ways?  Of course, they have recently announced the ability to post trophy acquisitions to Facebook.... but they take 'Other OS' support out?!</htmltext>
<tokenext>Nice that Sony took out the ability to install Linux on the slim PS3 .
How hard could it have been to have a left the feature in that is useful in a number of ways ?
Of course , they have recently announced the ability to post trophy acquisitions to Facebook.... but they take 'Other OS ' support out ?
!</tokentext>
<sentencetext>Nice that Sony took out the ability to install Linux on the slim PS3.
How hard could it have been to have a left the feature in that is useful in a number of ways?
Of course, they have recently announced the ability to post trophy acquisitions to Facebook.... but they take 'Other OS' support out?
!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149800</id>
	<title>they'll need more... a lot more</title>
	<author>Anonymous</author>
	<datestamp>1257075300000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>assuming a perp uses a password from a set of 26 letters to choose from, it will take roughly two minutes to brute-force an 8-letter or fewer password with 40 Ps3's.  (26^8 + 26^7 +<nobr> <wbr></nobr>...) / (40 * 4 * 10^7).  wow, that's great!  but....</p><p>assuming a set of approximately 90 characters to choose from, it will take approximately a month<nobr> <wbr></nobr>:(</p></htmltext>
<tokenext>assuming a perp uses a password from a set of 26 letters to choose from , it will take roughly two minutes to brute-force an 8-letter or fewer password with 40 Ps3 's .
( 26 ^ 8 + 26 ^ 7 + ... ) / ( 40 * 4 * 10 ^ 7 ) .
wow , that 's great !
but....assuming a set of approximately 90 characters to choose from , it will take approximately a month : (</tokentext>
<sentencetext>assuming a perp uses a password from a set of 26 letters to choose from, it will take roughly two minutes to brute-force an 8-letter or fewer password with 40 Ps3's.
(26^8 + 26^7 + ...) / (40 * 4 * 10^7).
wow, that's great!
but....assuming a set of approximately 90 characters to choose from, it will take approximately a month :(</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30157228</id>
	<title>Late Breaking News</title>
	<author>Stregano</author>
	<datestamp>1258649100000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>In other news, 25 US Governemtn employees working on breakinf ecrypted passwords lose their jobs for playing Modern Warfare 2 on the clock.</htmltext>
<tokenext>In other news , 25 US Governemtn employees working on breakinf ecrypted passwords lose their jobs for playing Modern Warfare 2 on the clock .</tokentext>
<sentencetext>In other news, 25 US Governemtn employees working on breakinf ecrypted passwords lose their jobs for playing Modern Warfare 2 on the clock.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151424</id>
	<title>Re:Nit-picking the article</title>
	<author>lofoforabr</author>
	<datestamp>1257083400000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I have set up 2 keyboard layouts here at home (US English and Russian). I alternate between them using a combination of keys (running GNOME here).<br>
All places on which I'm pretty sure I'll only want to access from home, I go and use a russian password or passphrase (yes, in cyrillic).<br>
So, I guess my password most likely won't be found if all they search is for latin letters, numbers and symbols.</htmltext>
<tokenext>I have set up 2 keyboard layouts here at home ( US English and Russian ) .
I alternate between them using a combination of keys ( running GNOME here ) .
All places on which I 'm pretty sure I 'll only want to access from home , I go and use a russian password or passphrase ( yes , in cyrillic ) .
So , I guess my password most likely wo n't be found if all they search is for latin letters , numbers and symbols .</tokentext>
<sentencetext>I have set up 2 keyboard layouts here at home (US English and Russian).
I alternate between them using a combination of keys (running GNOME here).
All places on which I'm pretty sure I'll only want to access from home, I go and use a russian password or passphrase (yes, in cyrillic).
So, I guess my password most likely won't be found if all they search is for latin letters, numbers and symbols.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149718</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150288</id>
	<title>If the perp isn't savvy</title>
	<author>beej</author>
	<datestamp>1257077160000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>If the perp's not crypto-savvy, this will work pretty well, I think.  I use John The Ripper for password cracking the machine I admin, and it actually catches people from time to time. Once back in college (when computer people were friendly to this sort of thing) I wrote and ran a naive password cracker using<nobr> <wbr></nobr>/usr/dict/words--it caught an instructor with the password "sunshine". Most people, including most child pornography enthusiasts, will use shitty passwords.</p><p>If the perp uses 160 characters of plain English text, however, the PS3s are going to have their work cut out for them, cracking passwords in an average of 300 trillion years per.</p><p>I'm pretty sure the PS3s will be out of warranty by then, but the C3 will be able to run 37 quintillion full-speed PS3 emulators on the Dimension 37 Interuniversal Hadron Computer.</p></htmltext>
<tokenext>If the perp 's not crypto-savvy , this will work pretty well , I think .
I use John The Ripper for password cracking the machine I admin , and it actually catches people from time to time .
Once back in college ( when computer people were friendly to this sort of thing ) I wrote and ran a naive password cracker using /usr/dict/words--it caught an instructor with the password " sunshine " .
Most people , including most child pornography enthusiasts , will use shitty passwords.If the perp uses 160 characters of plain English text , however , the PS3s are going to have their work cut out for them , cracking passwords in an average of 300 trillion years per.I 'm pretty sure the PS3s will be out of warranty by then , but the C3 will be able to run 37 quintillion full-speed PS3 emulators on the Dimension 37 Interuniversal Hadron Computer .</tokentext>
<sentencetext>If the perp's not crypto-savvy, this will work pretty well, I think.
I use John The Ripper for password cracking the machine I admin, and it actually catches people from time to time.
Once back in college (when computer people were friendly to this sort of thing) I wrote and ran a naive password cracker using /usr/dict/words--it caught an instructor with the password "sunshine".
Most people, including most child pornography enthusiasts, will use shitty passwords.If the perp uses 160 characters of plain English text, however, the PS3s are going to have their work cut out for them, cracking passwords in an average of 300 trillion years per.I'm pretty sure the PS3s will be out of warranty by then, but the C3 will be able to run 37 quintillion full-speed PS3 emulators on the Dimension 37 Interuniversal Hadron Computer.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149962</id>
	<title>This makes no sense</title>
	<author>Anonymous</author>
	<datestamp>1257075900000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Seriously, who does this?  Forgetting about the whole "oh look we can spy on our citizens better" thing, if you have a 128 bit password, and lets assume that, for whatever reason, it's really only 100 bits.  Then we have 2^100 possibilities.  Further, lets assume than instead of 4 million a second, they meant 4 TRILLION a second, so 4 million * 1000 * 1000.</p><p>2^100 = 1267650600228229401496703205376</p><p>Divided by 4,000,000,000,000 = 316912650057057350 seconds, which is 3667970486771.497110812219922963 days, or 10420370700 years.</p><p>10420370700 years.</p><p>gl hf</p></htmltext>
<tokenext>Seriously , who does this ?
Forgetting about the whole " oh look we can spy on our citizens better " thing , if you have a 128 bit password , and lets assume that , for whatever reason , it 's really only 100 bits .
Then we have 2 ^ 100 possibilities .
Further , lets assume than instead of 4 million a second , they meant 4 TRILLION a second , so 4 million * 1000 * 1000.2 ^ 100 = 1267650600228229401496703205376Divided by 4,000,000,000,000 = 316912650057057350 seconds , which is 3667970486771.497110812219922963 days , or 10420370700 years.10420370700 years.gl hf</tokentext>
<sentencetext>Seriously, who does this?
Forgetting about the whole "oh look we can spy on our citizens better" thing, if you have a 128 bit password, and lets assume that, for whatever reason, it's really only 100 bits.
Then we have 2^100 possibilities.
Further, lets assume than instead of 4 million a second, they meant 4 TRILLION a second, so 4 million * 1000 * 1000.2^100 = 1267650600228229401496703205376Divided by 4,000,000,000,000 = 316912650057057350 seconds, which is 3667970486771.497110812219922963 days, or 10420370700 years.10420370700 years.gl hf</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152720</id>
	<title>silly story</title>
	<author>astar</author>
	<datestamp>1257093780000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>regarding your sig</p><p>I once had a printer catch on fire.  At least the paper.  It had four big matrix heads with big selenoids driving the wires.  They  drew quite a bit of current.  One jammed up the wires, heated up, and paper started smoking and charing.  Naturally, it was the payroll checks, but as a result I was keeping a close eye on them.  Only time I missed payroll deadlines.</p></htmltext>
<tokenext>regarding your sigI once had a printer catch on fire .
At least the paper .
It had four big matrix heads with big selenoids driving the wires .
They drew quite a bit of current .
One jammed up the wires , heated up , and paper started smoking and charing .
Naturally , it was the payroll checks , but as a result I was keeping a close eye on them .
Only time I missed payroll deadlines .</tokentext>
<sentencetext>regarding your sigI once had a printer catch on fire.
At least the paper.
It had four big matrix heads with big selenoids driving the wires.
They  drew quite a bit of current.
One jammed up the wires, heated up, and paper started smoking and charing.
Naturally, it was the payroll checks, but as a result I was keeping a close eye on them.
Only time I missed payroll deadlines.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149546</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152812</id>
	<title>linux id Cells</title>
	<author>falconwolf</author>
	<datestamp>1257094560000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><i>If memory servers, the cell platform in a PS3 doesn't allow you to use all of the cores when you're running linux</i></p><p>It's the hardware Sony includes on PS3s that don't work well with Linux.  <a href="http://en.wikipedia.org/wiki/Cell\_(microprocessor)" title="wikipedia.org">IBM</a> [wikipedia.org] supports Linux on Cells.</p><p>

Falcon</p></htmltext>
<tokenext>If memory servers , the cell platform in a PS3 does n't allow you to use all of the cores when you 're running linuxIt 's the hardware Sony includes on PS3s that do n't work well with Linux .
IBM [ wikipedia.org ] supports Linux on Cells .
Falcon</tokentext>
<sentencetext>If memory servers, the cell platform in a PS3 doesn't allow you to use all of the cores when you're running linuxIt's the hardware Sony includes on PS3s that don't work well with Linux.
IBM [wikipedia.org] supports Linux on Cells.
Falcon</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149604</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149576</id>
	<title>I see a trend here</title>
	<author>kammat</author>
	<datestamp>1257074460000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>The PS2 was restricted for export because people thought Saddam would use them to build missile guidance units.  We're using the PS3 to crack encryption.  I can't wait to see what uses they'll think up for the Playstation 4.  Nuclear simulation?</p></htmltext>
<tokenext>The PS2 was restricted for export because people thought Saddam would use them to build missile guidance units .
We 're using the PS3 to crack encryption .
I ca n't wait to see what uses they 'll think up for the Playstation 4 .
Nuclear simulation ?</tokentext>
<sentencetext>The PS2 was restricted for export because people thought Saddam would use them to build missile guidance units.
We're using the PS3 to crack encryption.
I can't wait to see what uses they'll think up for the Playstation 4.
Nuclear simulation?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151956</id>
	<title>What they really are being used for</title>
	<author>Conchobair</author>
	<datestamp>1257087060000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I.T. Guy gets called into his Bosses office:<br>
"PS3s, huh? What?  On invoice... right, ooooh, those PS3s... oh, hmm yeah I ordered those, they are for... uhm... they're for breaking passwords to... crack down on... hmm, child pornography.  Right!  Yeah, that's what they are for.  The guys are just finishing testing the... the hardware.  I'll go check on them."<br>
*Runs back to desk and hides copies of Modern Warfare 2*</htmltext>
<tokenext>I.T .
Guy gets called into his Bosses office : " PS3s , huh ?
What ? On invoice... right , ooooh , those PS3s... oh , hmm yeah I ordered those , they are for... uhm... they 're for breaking passwords to... crack down on... hmm , child pornography .
Right ! Yeah , that 's what they are for .
The guys are just finishing testing the... the hardware .
I 'll go check on them .
" * Runs back to desk and hides copies of Modern Warfare 2 *</tokentext>
<sentencetext>I.T.
Guy gets called into his Bosses office:
"PS3s, huh?
What?  On invoice... right, ooooh, those PS3s... oh, hmm yeah I ordered those, they are for... uhm... they're for breaking passwords to... crack down on... hmm, child pornography.
Right!  Yeah, that's what they are for.
The guys are just finishing testing the... the hardware.
I'll go check on them.
"
*Runs back to desk and hides copies of Modern Warfare 2*</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152148</id>
	<title>Re:Nice move Sony</title>
	<author>Lord Maud'Dib</author>
	<datestamp>1257088200000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I have on old fat 60gb (with the backwards compatibility) and recently bought a new slim. When setting up the systems I found that the slim didn't like the hdd from the fat as is. It would not boot and kept demanding a usb drive with the system on it to boot. Switched the hdd back to the original and it booted properly. Seems to me the system software is kept on the hdd of the slim but in some sort of flash on the fat. I'm mentioning it here because I've not found a reference anywhere to this difference in operation, but it makes sense from a cost cutting angle. Also, the slim boots more slowly, probably because it's waiting for the hdd to spin up.</htmltext>
<tokenext>I have on old fat 60gb ( with the backwards compatibility ) and recently bought a new slim .
When setting up the systems I found that the slim did n't like the hdd from the fat as is .
It would not boot and kept demanding a usb drive with the system on it to boot .
Switched the hdd back to the original and it booted properly .
Seems to me the system software is kept on the hdd of the slim but in some sort of flash on the fat .
I 'm mentioning it here because I 've not found a reference anywhere to this difference in operation , but it makes sense from a cost cutting angle .
Also , the slim boots more slowly , probably because it 's waiting for the hdd to spin up .</tokentext>
<sentencetext>I have on old fat 60gb (with the backwards compatibility) and recently bought a new slim.
When setting up the systems I found that the slim didn't like the hdd from the fat as is.
It would not boot and kept demanding a usb drive with the system on it to boot.
Switched the hdd back to the original and it booted properly.
Seems to me the system software is kept on the hdd of the slim but in some sort of flash on the fat.
I'm mentioning it here because I've not found a reference anywhere to this difference in operation, but it makes sense from a cost cutting angle.
Also, the slim boots more slowly, probably because it's waiting for the hdd to spin up.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149566</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149720</id>
	<title>Hey..</title>
	<author>lazylocomotives</author>
	<datestamp>1257075000000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>At least they didn't claim to use Wiis for that!</htmltext>
<tokenext>At least they did n't claim to use Wiis for that !</tokentext>
<sentencetext>At least they didn't claim to use Wiis for that!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30154688</id>
	<title>Re:Hmmmm</title>
	<author>Anonymous</author>
	<datestamp>1258635300000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Not an alternative to passwords, but an alternative to current encryption practice could be raid-style striping. Either split your data several ways, with each 'volume' needing a different password, or stripe your data over several physical mediums (with or without different passwords). Like your hard drive, USB key and a something on the net.</p><p>(I've toyed with the idea of using sites like flickr and twitter to store stuff in the 'cloud'. A few meaningless jpegs and tweets in the ether could be reformed into something if you knew the IDs, order and decryption scheme. To anyone else it would be meaningless.)</p><p>I have no idea if this is already used, I don't have anything exciting enough to encrypt<nobr> <wbr></nobr>:(</p><p>I think the days of passwords being uncrackable are over. However, making it really time consuming and laborious can still be achieved.</p></htmltext>
<tokenext>Not an alternative to passwords , but an alternative to current encryption practice could be raid-style striping .
Either split your data several ways , with each 'volume ' needing a different password , or stripe your data over several physical mediums ( with or without different passwords ) .
Like your hard drive , USB key and a something on the net .
( I 've toyed with the idea of using sites like flickr and twitter to store stuff in the 'cloud' .
A few meaningless jpegs and tweets in the ether could be reformed into something if you knew the IDs , order and decryption scheme .
To anyone else it would be meaningless .
) I have no idea if this is already used , I do n't have anything exciting enough to encrypt : ( I think the days of passwords being uncrackable are over .
However , making it really time consuming and laborious can still be achieved .</tokentext>
<sentencetext>Not an alternative to passwords, but an alternative to current encryption practice could be raid-style striping.
Either split your data several ways, with each 'volume' needing a different password, or stripe your data over several physical mediums (with or without different passwords).
Like your hard drive, USB key and a something on the net.
(I've toyed with the idea of using sites like flickr and twitter to store stuff in the 'cloud'.
A few meaningless jpegs and tweets in the ether could be reformed into something if you knew the IDs, order and decryption scheme.
To anyone else it would be meaningless.
)I have no idea if this is already used, I don't have anything exciting enough to encrypt :(I think the days of passwords being uncrackable are over.
However, making it really time consuming and laborious can still be achieved.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150566</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149744</id>
	<title>Re:What</title>
	<author>Anonymous</author>
	<datestamp>1257075120000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>GnuPG in --symmetric mode. GPGee is a nice wrapper for it on Windows, if that's your thing.</p></htmltext>
<tokenext>GnuPG in --symmetric mode .
GPGee is a nice wrapper for it on Windows , if that 's your thing .</tokentext>
<sentencetext>GnuPG in --symmetric mode.
GPGee is a nice wrapper for it on Windows, if that's your thing.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149634</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153272</id>
	<title>Re:Lovely encryption</title>
	<author>Anonymous</author>
	<datestamp>1257100260000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><div class="quote"><p>Good to know when the Government is cracking the encryption implemented by the public it's "cracking down on child pornography." When it's the public cracking encryption implemented by corporations it's a violation of the DMCA.</p></div><p>Yeah!  It's almost as if the government panders to exactly the fears and greeds of its constituents that gains it the most power!  It's a good thing they exist in a vacuum so that we don't have to blame ourselves for continually eating up what they serve and voting them into office.</p></div>
	</htmltext>
<tokenext>Good to know when the Government is cracking the encryption implemented by the public it 's " cracking down on child pornography .
" When it 's the public cracking encryption implemented by corporations it 's a violation of the DMCA.Yeah !
It 's almost as if the government panders to exactly the fears and greeds of its constituents that gains it the most power !
It 's a good thing they exist in a vacuum so that we do n't have to blame ourselves for continually eating up what they serve and voting them into office .</tokentext>
<sentencetext>Good to know when the Government is cracking the encryption implemented by the public it's "cracking down on child pornography.
" When it's the public cracking encryption implemented by corporations it's a violation of the DMCA.Yeah!
It's almost as if the government panders to exactly the fears and greeds of its constituents that gains it the most power!
It's a good thing they exist in a vacuum so that we don't have to blame ourselves for continually eating up what they serve and voting them into office.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149658</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149768</id>
	<title>Re:What</title>
	<author>Pentium100</author>
	<datestamp>1257075180000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>TrueCrypt ( www.truecrypt.org )<br>Rubberhose ( <a href="http://iq.org/~proff/marutukku.org/" title="iq.org">http://iq.org/~proff/marutukku.org/</a> [iq.org] )</p><p>Some others, but these come to mind first...</p></htmltext>
<tokenext>TrueCrypt ( www.truecrypt.org ) Rubberhose ( http : //iq.org/ ~ proff/marutukku.org/ [ iq.org ] ) Some others , but these come to mind first.. .</tokentext>
<sentencetext>TrueCrypt ( www.truecrypt.org )Rubberhose ( http://iq.org/~proff/marutukku.org/ [iq.org] )Some others, but these come to mind first...</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149634</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150148</id>
	<title>They aren't cracking Encryption!</title>
	<author>rahvin112</author>
	<datestamp>1257076500000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>3</modscore>
	<htmltext><p>There is a difference between cracking encryption and the password used to secure the encryption. The article says they are using the systems to crack passwords, not encryption. The submitter has a reading problem.</p></htmltext>
<tokenext>There is a difference between cracking encryption and the password used to secure the encryption .
The article says they are using the systems to crack passwords , not encryption .
The submitter has a reading problem .</tokentext>
<sentencetext>There is a difference between cracking encryption and the password used to secure the encryption.
The article says they are using the systems to crack passwords, not encryption.
The submitter has a reading problem.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30154844</id>
	<title>Have they heard of the ASUS ESC 1000 ?</title>
	<author>DNX Blandy</author>
	<datestamp>1258638000000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Link:
<a href="http://www.tomshardware.com/news/Asus-Nvidia-Supercomputer-Cores-960,8943.html" title="tomshardware.com" rel="nofollow">http://www.tomshardware.com/news/Asus-Nvidia-Supercomputer-Cores-960,8943.html</a> [tomshardware.com]

I know it costs more but when you consider you'll get 1.1 teraflops of power, it'll munch away at a mental speed. All this in a standard PC tower!!!</htmltext>
<tokenext>Link : http : //www.tomshardware.com/news/Asus-Nvidia-Supercomputer-Cores-960,8943.html [ tomshardware.com ] I know it costs more but when you consider you 'll get 1.1 teraflops of power , it 'll munch away at a mental speed .
All this in a standard PC tower ! !
!</tokentext>
<sentencetext>Link:
http://www.tomshardware.com/news/Asus-Nvidia-Supercomputer-Cores-960,8943.html [tomshardware.com]

I know it costs more but when you consider you'll get 1.1 teraflops of power, it'll munch away at a mental speed.
All this in a standard PC tower!!
!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30159872</id>
	<title>Re:Hmmmm</title>
	<author>IndustrialComplex</author>
	<datestamp>1258657140000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I've taken to forgetting the letters completely and relying more on keyboard patterns.  I'd think of some musical theme and 'play' it on my keyboard.   I'd practice the pattern a few times and eventually I'd have a password that doesn't exist in any dictionary (it might, but I wouldn't know it).</p><p>I liked it because I remembered them through muscle memory and didn't have to think, 'Was that letter caPitolized or thiS one?'  I just knew the pattern.</p><p>The drawbacks I faced were this:</p><p>1.  Ergonomic keyboards (The extreme ones) would throw off my pattern since I didn't always stick with resting my hands on the home row of keys to start.</p><p>2.  password rules messed me up when they required a specific amount of special characters rather than just requiring a length.  When you actually do have a random password, sometimes you don't always include those special characters.</p><p>3.  Recalling my password without a keyboard in front of me.  For example, some banks ask you to 'click' in your password using a mouse.  Since I didn't know the content of my password, and just the pattern, I couldn't ever remember it to click it in.</p></htmltext>
<tokenext>I 've taken to forgetting the letters completely and relying more on keyboard patterns .
I 'd think of some musical theme and 'play ' it on my keyboard .
I 'd practice the pattern a few times and eventually I 'd have a password that does n't exist in any dictionary ( it might , but I would n't know it ) .I liked it because I remembered them through muscle memory and did n't have to think , 'Was that letter caPitolized or thiS one ?
' I just knew the pattern.The drawbacks I faced were this : 1 .
Ergonomic keyboards ( The extreme ones ) would throw off my pattern since I did n't always stick with resting my hands on the home row of keys to start.2 .
password rules messed me up when they required a specific amount of special characters rather than just requiring a length .
When you actually do have a random password , sometimes you do n't always include those special characters.3 .
Recalling my password without a keyboard in front of me .
For example , some banks ask you to 'click ' in your password using a mouse .
Since I did n't know the content of my password , and just the pattern , I could n't ever remember it to click it in .</tokentext>
<sentencetext>I've taken to forgetting the letters completely and relying more on keyboard patterns.
I'd think of some musical theme and 'play' it on my keyboard.
I'd practice the pattern a few times and eventually I'd have a password that doesn't exist in any dictionary (it might, but I wouldn't know it).I liked it because I remembered them through muscle memory and didn't have to think, 'Was that letter caPitolized or thiS one?
'  I just knew the pattern.The drawbacks I faced were this:1.
Ergonomic keyboards (The extreme ones) would throw off my pattern since I didn't always stick with resting my hands on the home row of keys to start.2.
password rules messed me up when they required a specific amount of special characters rather than just requiring a length.
When you actually do have a random password, sometimes you don't always include those special characters.3.
Recalling my password without a keyboard in front of me.
For example, some banks ask you to 'click' in your password using a mouse.
Since I didn't know the content of my password, and just the pattern, I couldn't ever remember it to click it in.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30158892</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153798</id>
	<title>Re:Nit-picking the article</title>
	<author>fnj</author>
	<datestamp>1258663320000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><blockquote><div><p>The real smart crooks encrypt their stuff in a way that nothing short of banging them over the head with a $5 pipe wrench will ever reveal.</p></div></blockquote><p>I'm afraid that crushing the suspect's skull will almost instantly lead to unconsciousness and fairly rapid death through intracranial hemmorhage leading to the brain being destroyed due to swelling.  Or maybe the brain injury will only make him a gibbering idiot.  Either way, sorry, you're not going to retrieve the password this way.  I think the CIA or foreign counterparts could help you with more ingenious solutions.</p><p>Anyway, no matter how many passwords you can "generate" per second, it takes a lot longer to try them out than to come up with the candidates.  Any password security system worth a shit will incorporate gross slowdown mechanisms to deal with brute force attacks, and hopefully after a few thousand attempts it will permanently cease allowing further attempts.</p></div>
	</htmltext>
<tokenext>The real smart crooks encrypt their stuff in a way that nothing short of banging them over the head with a $ 5 pipe wrench will ever reveal.I 'm afraid that crushing the suspect 's skull will almost instantly lead to unconsciousness and fairly rapid death through intracranial hemmorhage leading to the brain being destroyed due to swelling .
Or maybe the brain injury will only make him a gibbering idiot .
Either way , sorry , you 're not going to retrieve the password this way .
I think the CIA or foreign counterparts could help you with more ingenious solutions.Anyway , no matter how many passwords you can " generate " per second , it takes a lot longer to try them out than to come up with the candidates .
Any password security system worth a shit will incorporate gross slowdown mechanisms to deal with brute force attacks , and hopefully after a few thousand attempts it will permanently cease allowing further attempts .</tokentext>
<sentencetext>The real smart crooks encrypt their stuff in a way that nothing short of banging them over the head with a $5 pipe wrench will ever reveal.I'm afraid that crushing the suspect's skull will almost instantly lead to unconsciousness and fairly rapid death through intracranial hemmorhage leading to the brain being destroyed due to swelling.
Or maybe the brain injury will only make him a gibbering idiot.
Either way, sorry, you're not going to retrieve the password this way.
I think the CIA or foreign counterparts could help you with more ingenious solutions.Anyway, no matter how many passwords you can "generate" per second, it takes a lot longer to try them out than to come up with the candidates.
Any password security system worth a shit will incorporate gross slowdown mechanisms to deal with brute force attacks, and hopefully after a few thousand attempts it will permanently cease allowing further attempts.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149718</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30154164</id>
	<title>Re:Hmmmm</title>
	<author>cortesoft</author>
	<datestamp>1258626660000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>There is a difference between a normal password and a password used for encryption.  For example, a password to log in to a website does not need to be able to handle 4 million guesses a second.... it will be rate limited by the website way before that happens.</p><p>You only need to choose a large random password for encryption that you need to be able to handle a local access attack..... like hard drive encryption... so you most likely only need one. so it is probably something you don't have to type in very often..... and you can choose something you never change, as a local disk attack is unlikely to occur without you realizing it, at which point you can know to change your password to something new and very long.</p></htmltext>
<tokenext>There is a difference between a normal password and a password used for encryption .
For example , a password to log in to a website does not need to be able to handle 4 million guesses a second.... it will be rate limited by the website way before that happens.You only need to choose a large random password for encryption that you need to be able to handle a local access attack..... like hard drive encryption... so you most likely only need one .
so it is probably something you do n't have to type in very often..... and you can choose something you never change , as a local disk attack is unlikely to occur without you realizing it , at which point you can know to change your password to something new and very long .</tokentext>
<sentencetext>There is a difference between a normal password and a password used for encryption.
For example, a password to log in to a website does not need to be able to handle 4 million guesses a second.... it will be rate limited by the website way before that happens.You only need to choose a large random password for encryption that you need to be able to handle a local access attack..... like hard drive encryption... so you most likely only need one.
so it is probably something you don't have to type in very often..... and you can choose something you never change, as a local disk attack is unlikely to occur without you realizing it, at which point you can know to change your password to something new and very long.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150566</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151270</id>
	<title>Re:Nit-picking the article</title>
	<author>Anonymous</author>
	<datestamp>1257082440000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>If the smart crooks are using any version of Windows, they wrote their own encryption software. AFAIK there is no encryption software that accepts arbitrary (unicode, anyone?) characters. Would be sweet though - and troublesome.</p></htmltext>
<tokenext>If the smart crooks are using any version of Windows , they wrote their own encryption software .
AFAIK there is no encryption software that accepts arbitrary ( unicode , anyone ?
) characters .
Would be sweet though - and troublesome .</tokentext>
<sentencetext>If the smart crooks are using any version of Windows, they wrote their own encryption software.
AFAIK there is no encryption software that accepts arbitrary (unicode, anyone?
) characters.
Would be sweet though - and troublesome.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150030</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152910</id>
	<title>Whoa...</title>
	<author>uvajed\_ekil</author>
	<datestamp>1257095520000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I know there are plenty of real pervs out there, but are the authorities really seizing so much suspected, carefully encrypted kiddie porn to necessitate systems of this magnitude and complexity? My suspicion is that they are using this for "off the record" uses, as well as legitimate ones. Surely some criminally perverted folks are smart enough to use some sort of electronic security measures to protect their stash, but how many, out of how many pedophiles there are, and how many of them are caught and have their filthy computers analyzed? I guess politicians and appointed officials can't ask about supposed anti-child porn measures, just as no one can question anything done in the name of patriotism, fighting terrorism, or when something like cancer prevention is involved. Or is this problem that much bigger than the rest of us take it to be?</htmltext>
<tokenext>I know there are plenty of real pervs out there , but are the authorities really seizing so much suspected , carefully encrypted kiddie porn to necessitate systems of this magnitude and complexity ?
My suspicion is that they are using this for " off the record " uses , as well as legitimate ones .
Surely some criminally perverted folks are smart enough to use some sort of electronic security measures to protect their stash , but how many , out of how many pedophiles there are , and how many of them are caught and have their filthy computers analyzed ?
I guess politicians and appointed officials ca n't ask about supposed anti-child porn measures , just as no one can question anything done in the name of patriotism , fighting terrorism , or when something like cancer prevention is involved .
Or is this problem that much bigger than the rest of us take it to be ?</tokentext>
<sentencetext>I know there are plenty of real pervs out there, but are the authorities really seizing so much suspected, carefully encrypted kiddie porn to necessitate systems of this magnitude and complexity?
My suspicion is that they are using this for "off the record" uses, as well as legitimate ones.
Surely some criminally perverted folks are smart enough to use some sort of electronic security measures to protect their stash, but how many, out of how many pedophiles there are, and how many of them are caught and have their filthy computers analyzed?
I guess politicians and appointed officials can't ask about supposed anti-child porn measures, just as no one can question anything done in the name of patriotism, fighting terrorism, or when something like cancer prevention is involved.
Or is this problem that much bigger than the rest of us take it to be?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152300</id>
	<title>PS3s are really good for decrypting</title>
	<author>Bobberly</author>
	<datestamp>1257089280000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>You should take a look at www.distributed.net.  Supposedly the RC5-72 challenge could end in 6 months with about 100 PS3s contributing.</htmltext>
<tokenext>You should take a look at www.distributed.net .
Supposedly the RC5-72 challenge could end in 6 months with about 100 PS3s contributing .</tokentext>
<sentencetext>You should take a look at www.distributed.net.
Supposedly the RC5-72 challenge could end in 6 months with about 100 PS3s contributing.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30156818</id>
	<title>Re:And Sony's thoughts?</title>
	<author>NotBornYesterday</author>
	<datestamp>1258647960000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>This is what they get for rootkitting our PCs.</htmltext>
<tokenext>This is what they get for rootkitting our PCs .</tokentext>
<sentencetext>This is what they get for rootkitting our PCs.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150386</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152416</id>
	<title>Re:Hmmmm</title>
	<author>sanosuke001</author>
	<datestamp>1257090240000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I would like to see all online sites adopt a universally used password system using those number-changing RSA key dongles. However, the only ones I've seen are 6-8 numbers; just pick one and try over and over and you'll get it eventually. They need to design one with 10+ using the alphanumeric, upper and lowercase, with punctuation dongle. That way, you could have one dongle for all your online accounts.<br> <br>

Unfortunately, one company (or the government) would have to run it and a single point of failure is never a good thing. Though, it could be done.</htmltext>
<tokenext>I would like to see all online sites adopt a universally used password system using those number-changing RSA key dongles .
However , the only ones I 've seen are 6-8 numbers ; just pick one and try over and over and you 'll get it eventually .
They need to design one with 10 + using the alphanumeric , upper and lowercase , with punctuation dongle .
That way , you could have one dongle for all your online accounts .
Unfortunately , one company ( or the government ) would have to run it and a single point of failure is never a good thing .
Though , it could be done .</tokentext>
<sentencetext>I would like to see all online sites adopt a universally used password system using those number-changing RSA key dongles.
However, the only ones I've seen are 6-8 numbers; just pick one and try over and over and you'll get it eventually.
They need to design one with 10+ using the alphanumeric, upper and lowercase, with punctuation dongle.
That way, you could have one dongle for all your online accounts.
Unfortunately, one company (or the government) would have to run it and a single point of failure is never a good thing.
Though, it could be done.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150566</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151010</id>
	<title>sign of the times</title>
	<author>Anonymous</author>
	<datestamp>1257081000000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>heavily indebted country turns to externalities to solve problems.  The externality being that Sony sells PlayStations to sell games...  no shit the new slim version is locked down.  Sony is not in the business of subsidising broke-ass governments.</p></htmltext>
<tokenext>heavily indebted country turns to externalities to solve problems .
The externality being that Sony sells PlayStations to sell games... no shit the new slim version is locked down .
Sony is not in the business of subsidising broke-ass governments .</tokentext>
<sentencetext>heavily indebted country turns to externalities to solve problems.
The externality being that Sony sells PlayStations to sell games...  no shit the new slim version is locked down.
Sony is not in the business of subsidising broke-ass governments.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150776</id>
	<title>Re:Nit-picking the article</title>
	<author>bugs2squash</author>
	<datestamp>1257079740000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Exactly... So if it takes more than 84^6 attempts to crack then the owner of this PC is for sure guilty of something. This system is only looking for guilt by association with strong passwords, it does not need to actually crack the strong password.</htmltext>
<tokenext>Exactly... So if it takes more than 84 ^ 6 attempts to crack then the owner of this PC is for sure guilty of something .
This system is only looking for guilt by association with strong passwords , it does not need to actually crack the strong password .</tokentext>
<sentencetext>Exactly... So if it takes more than 84^6 attempts to crack then the owner of this PC is for sure guilty of something.
This system is only looking for guilt by association with strong passwords, it does not need to actually crack the strong password.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149718</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151324</id>
	<title>Riiiight....</title>
	<author>Stanislav\_J</author>
	<datestamp>1257082740000</datestamp>
	<modclass>Funny</modclass>
	<modscore>3</modscore>
	<htmltext><p><div class="quote"><p>Naturally this is only being used to break encryption on computers seized with a warrant and suspected of harboring child pornography.</p></div><p>Naturally. (*wink-wink* *nudge-nudge* say no more...)</p></div>
	</htmltext>
<tokenext>Naturally this is only being used to break encryption on computers seized with a warrant and suspected of harboring child pornography.Naturally .
( * wink-wink * * nudge-nudge * say no more... )</tokentext>
<sentencetext>Naturally this is only being used to break encryption on computers seized with a warrant and suspected of harboring child pornography.Naturally.
(*wink-wink* *nudge-nudge* say no more...)
	</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30154648</id>
	<title>Re:New metric...???</title>
	<author>Thrakamazog</author>
	<datestamp>1258634580000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>4 million passwords a second, Sir!</htmltext>
<tokenext>4 million passwords a second , Sir !</tokentext>
<sentencetext>4 million passwords a second, Sir!</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149642</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151348</id>
	<title>Re:What</title>
	<author>Anonymous</author>
	<datestamp>1257082920000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><a href="http://www.digipedia.pl/man/doc/view/aespipe.1.html" title="digipedia.pl" rel="nofollow">aespipe</a> [digipedia.pl]</htmltext>
<tokenext>aespipe [ digipedia.pl ]</tokentext>
<sentencetext>aespipe [digipedia.pl]</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149634</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152172</id>
	<title>Re:Nit-picking the article</title>
	<author>Anonymous</author>
	<datestamp>1257088320000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Perhaps you might use a non-alphanumeric character by memorizing a 3-digit code, but then again there's actually a trade-off here:  just putting those 3 digits in the password means there's a 3-char segment with 1000 possibilities (or really, they could be any alphanumeric chars) vs. a single character with say 220 (avoiding control chars).  That is to say, you could probably have a 10 char alphanumeric password for the same difficulty of memorization as an 8 char password with a single non-alphanumeric character.</p><p>Although the non-alphanumeric still has the advantage of the fact that now any character in the password could potentially be a non-alphanumeric char (perhaps more than one), so it's say 62^10 vs. 220^8, or about 6.5 times as many possibilities, but if they assume only one non-alphanumeric char now it's just 8*220*62^7 or just about 0.007 times as many potential configurations.  (and that assumption seems like a pretty good one to start with if you're already having to brute-force it IMO)</p><p>Overall I'd have to say that using extended characters might not be such a great tradeoff if the cost is that you're using a shorter password than you could otherwise use.</p></htmltext>
<tokenext>Perhaps you might use a non-alphanumeric character by memorizing a 3-digit code , but then again there 's actually a trade-off here : just putting those 3 digits in the password means there 's a 3-char segment with 1000 possibilities ( or really , they could be any alphanumeric chars ) vs. a single character with say 220 ( avoiding control chars ) .
That is to say , you could probably have a 10 char alphanumeric password for the same difficulty of memorization as an 8 char password with a single non-alphanumeric character.Although the non-alphanumeric still has the advantage of the fact that now any character in the password could potentially be a non-alphanumeric char ( perhaps more than one ) , so it 's say 62 ^ 10 vs. 220 ^ 8 , or about 6.5 times as many possibilities , but if they assume only one non-alphanumeric char now it 's just 8 * 220 * 62 ^ 7 or just about 0.007 times as many potential configurations .
( and that assumption seems like a pretty good one to start with if you 're already having to brute-force it IMO ) Overall I 'd have to say that using extended characters might not be such a great tradeoff if the cost is that you 're using a shorter password than you could otherwise use .</tokentext>
<sentencetext>Perhaps you might use a non-alphanumeric character by memorizing a 3-digit code, but then again there's actually a trade-off here:  just putting those 3 digits in the password means there's a 3-char segment with 1000 possibilities (or really, they could be any alphanumeric chars) vs. a single character with say 220 (avoiding control chars).
That is to say, you could probably have a 10 char alphanumeric password for the same difficulty of memorization as an 8 char password with a single non-alphanumeric character.Although the non-alphanumeric still has the advantage of the fact that now any character in the password could potentially be a non-alphanumeric char (perhaps more than one), so it's say 62^10 vs. 220^8, or about 6.5 times as many possibilities, but if they assume only one non-alphanumeric char now it's just 8*220*62^7 or just about 0.007 times as many potential configurations.
(and that assumption seems like a pretty good one to start with if you're already having to brute-force it IMO)Overall I'd have to say that using extended characters might not be such a great tradeoff if the cost is that you're using a shorter password than you could otherwise use.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150030</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151058</id>
	<title>Re:Nice move Sony</title>
	<author>Anonymous</author>
	<datestamp>1257081240000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><div class="quote"><p>Sony loses money on each PS3 sold.  If the government isn't buying any games, then this is a loss for Sony.</p></div><p>They're buying old units second hand. Sony isn't part of this transaction.</p></div>
	</htmltext>
<tokenext>Sony loses money on each PS3 sold .
If the government is n't buying any games , then this is a loss for Sony.They 're buying old units second hand .
Sony is n't part of this transaction .</tokentext>
<sentencetext>Sony loses money on each PS3 sold.
If the government isn't buying any games, then this is a loss for Sony.They're buying old units second hand.
Sony isn't part of this transaction.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149844</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149634</id>
	<title>Re:What</title>
	<author>Anonymous</author>
	<datestamp>1257074700000</datestamp>
	<modclass>Troll</modclass>
	<modscore>-1</modscore>
	<htmltext><p>Just curious:<nobr> <wbr></nobr>...how does one encrypt files with a password?  Any free software available for that task?</p></htmltext>
<tokenext>Just curious : ...how does one encrypt files with a password ?
Any free software available for that task ?</tokentext>
<sentencetext>Just curious: ...how does one encrypt files with a password?
Any free software available for that task?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149520</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150436</id>
	<title>Nvidia 8800GT  PS3</title>
	<author>ymgve</author>
	<datestamp>1257077940000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>My 8800GT gets about 100 million passwords per second when cracking MD5 and SHA1 hashes. I thought the CELL was supposed to make the PS3 faster?</p></htmltext>
<tokenext>My 8800GT gets about 100 million passwords per second when cracking MD5 and SHA1 hashes .
I thought the CELL was supposed to make the PS3 faster ?</tokentext>
<sentencetext>My 8800GT gets about 100 million passwords per second when cracking MD5 and SHA1 hashes.
I thought the CELL was supposed to make the PS3 faster?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149658</id>
	<title>Lovely encryption</title>
	<author>Applekid</author>
	<datestamp>1257074820000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>5</modscore>
	<htmltext><p>Good to know when the Government is cracking the encryption implemented by the public it's "cracking down on child pornography." When it's the public cracking encryption implemented by corporations it's a violation of the DMCA.</p></htmltext>
<tokenext>Good to know when the Government is cracking the encryption implemented by the public it 's " cracking down on child pornography .
" When it 's the public cracking encryption implemented by corporations it 's a violation of the DMCA .</tokentext>
<sentencetext>Good to know when the Government is cracking the encryption implemented by the public it's "cracking down on child pornography.
" When it's the public cracking encryption implemented by corporations it's a violation of the DMCA.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30155694</id>
	<title>Re:Nvidia 8800GT PS3</title>
	<author>TheThiefMaster</author>
	<datestamp>1258643760000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>And before someone mentions it, I was talking in FLOPS because it's easier to find those numbers than integer ops numbers.</p></htmltext>
<tokenext>And before someone mentions it , I was talking in FLOPS because it 's easier to find those numbers than integer ops numbers .</tokentext>
<sentencetext>And before someone mentions it, I was talking in FLOPS because it's easier to find those numbers than integer ops numbers.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30155212</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152138</id>
	<title>next time...</title>
	<author>overcaffein8d</author>
	<datestamp>1257088140000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>...they should check under the mousepad</p></htmltext>
<tokenext>...they should check under the mousepad</tokentext>
<sentencetext>...they should check under the mousepad</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153756</id>
	<title>Watch out! They have a methodology</title>
	<author>Anonymous</author>
	<datestamp>1258662720000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I reckon that by replacing the word 'method' with the word 'methodology' they made themselves 45\% smarter and that boosted their ability to decrypt stuff.</p><p>Sheesh! Nothing like using a longer word to replace a shorter one to convince yourself that you're smarter but make everyone else realise that you are dimmer.</p></htmltext>
<tokenext>I reckon that by replacing the word 'method ' with the word 'methodology ' they made themselves 45 \ % smarter and that boosted their ability to decrypt stuff.Sheesh !
Nothing like using a longer word to replace a shorter one to convince yourself that you 're smarter but make everyone else realise that you are dimmer .</tokentext>
<sentencetext>I reckon that by replacing the word 'method' with the word 'methodology' they made themselves 45\% smarter and that boosted their ability to decrypt stuff.Sheesh!
Nothing like using a longer word to replace a shorter one to convince yourself that you're smarter but make everyone else realise that you are dimmer.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149710</id>
	<title>Re:Right idea, poor execution</title>
	<author>beefnog</author>
	<datestamp>1257075000000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>damn sleep deprivation. if memory SERVES.</htmltext>
<tokenext>damn sleep deprivation .
if memory SERVES .</tokentext>
<sentencetext>damn sleep deprivation.
if memory SERVES.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149604</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30156534</id>
	<title>Re:Hmmmm</title>
	<author>Anonymous</author>
	<datestamp>1258647060000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Use a passphrase: a sentence or something long and memorable. I shat 3 bricks last night. would be an example of a good passphrase, it has capital letters, numbers, and punctuation, and would be difficult to guess.</p></htmltext>
<tokenext>Use a passphrase : a sentence or something long and memorable .
I shat 3 bricks last night .
would be an example of a good passphrase , it has capital letters , numbers , and punctuation , and would be difficult to guess .</tokentext>
<sentencetext>Use a passphrase: a sentence or something long and memorable.
I shat 3 bricks last night.
would be an example of a good passphrase, it has capital letters, numbers, and punctuation, and would be difficult to guess.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150566</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150350</id>
	<title>Re:Wow, 4 million passwords per second...</title>
	<author>Anonymous</author>
	<datestamp>1257077460000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Eh don't be too hasty man, they might freeze you without your permission.</p><p>One day you're just happily forcing out that delicious meal last night, suddenly you just appear in a completely different location in silver clothing in a space ship in front of a jury.<br>Ouch.</p></htmltext>
<tokenext>Eh do n't be too hasty man , they might freeze you without your permission.One day you 're just happily forcing out that delicious meal last night , suddenly you just appear in a completely different location in silver clothing in a space ship in front of a jury.Ouch .</tokentext>
<sentencetext>Eh don't be too hasty man, they might freeze you without your permission.One day you're just happily forcing out that delicious meal last night, suddenly you just appear in a completely different location in silver clothing in a space ship in front of a jury.Ouch.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149716</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153420</id>
	<title>ICE</title>
	<author>westlake</author>
	<datestamp>1257102180000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><i>... suuuuuure.</i> </p><p>Purely as a novelty, the geek might ask himself what ICE is and what it does.</p><p><a href="http://www.ice.gov/index.htm" title="ice.gov">U.S. Immigration and Customs Enforcement</a> [ice.gov] has quite a lot on its plate, as this list of <a href="http://www.ice.gov/pi/topics/index.htm" title="ice.gov">Programs</a> [ice.gov] would suggest.</p><p><i>The Cyber Crimes Center (C3) Child Exploitation Section (CES) investigates the trans-border dimension of large-scale producers and distributors of images of child abuse, as well as individuals who travel in foreign commerce for the purpose of engaging in sex with minors. The CES employs the latest technology to collect evidence and track the activities of individuals and organized groups who sexually exploit children through the use of websites, chat rooms, newsgroups, and peer-to-peer trading. These investigative activities are organized under Operation Predator, a program managed by the CES. The CES also conducts clandestine operations throughout the world to identify and apprehend violators.</i></p><p><i><br>C3 brings the full range of ICE computer and forensic assets together in a single location to combat such Internet-related crimes as:</i></p><p><i>* Possession, manufacture and distribution of images of child abuse.<br>* International money laundering and illegal cyber-banking.<br>* Illegal arms trafficking and illegal export of strategic/controlled commodities.<br>* Drug trafficking (including prohibited pharmaceuticals).<br>* General Smuggling (including the trafficking in stolen art and antiquities; violations of the Endangered Species Act etc.)<br>* Intellectual property rights violations (including music and software).<br>* Immigration violations; identity and benefit fraud</i> </p><p>The phrase "images of child abuse" is telling. This is how the professional in law enforcement defines child pornography.</p><p><i>Operation Mango  -- An extensive investigation that closed down an American-owned beachside resort in Acapulco, Mexico, which offered children to sexual predators. The resort was a haven for pedophiles that traveled to the facility for the sole purpose of engaging in sex with minors. The proprietor of the business was convicted. As a result of this investigation and others, the government of Mexico recently created a Federal task force to address crimes against children in its country.</i> <a href="http://www.ice.gov/partners/investigations/services/cyberbranch.htm" title="ice.gov">Cyber Crimes Center</a> [ice.gov] </p><p><i>The VGTF is an international alliance of law enforcement agencies from the U.S., UK, Australia and Canada, working together to make the Internet a safer place; to identify, locate and help children at risk; and to hold those who commit on-line child abuse appropriately accountable. On-line child abuse includes activities such as searching for, sharing and downloading images of children being physically and sexually abused and engaging children in chat rooms with the intention of committing sexual abuse both on and off-line. The VGTF delivers innovative crime prevention and crime reduction initiatives to prevent and deter individuals from committing on-line child abuse.</i></p><p><i><br>ICE also partners with several Non-Governmental Organizations, including the National center for Missing &amp; Exploited Children, Netsmartz, World Vision and Rape, Abuse and Incest National Network, to fight crimes against children. <a href="http://www.ice.gov/partners/predator/index.htm" title="ice.gov">Operation Predator</a> [ice.gov]</i></p></htmltext>
<tokenext>... suuuuuure. Purely as a novelty , the geek might ask himself what ICE is and what it does.U.S .
Immigration and Customs Enforcement [ ice.gov ] has quite a lot on its plate , as this list of Programs [ ice.gov ] would suggest.The Cyber Crimes Center ( C3 ) Child Exploitation Section ( CES ) investigates the trans-border dimension of large-scale producers and distributors of images of child abuse , as well as individuals who travel in foreign commerce for the purpose of engaging in sex with minors .
The CES employs the latest technology to collect evidence and track the activities of individuals and organized groups who sexually exploit children through the use of websites , chat rooms , newsgroups , and peer-to-peer trading .
These investigative activities are organized under Operation Predator , a program managed by the CES .
The CES also conducts clandestine operations throughout the world to identify and apprehend violators.C3 brings the full range of ICE computer and forensic assets together in a single location to combat such Internet-related crimes as : * Possession , manufacture and distribution of images of child abuse .
* International money laundering and illegal cyber-banking .
* Illegal arms trafficking and illegal export of strategic/controlled commodities .
* Drug trafficking ( including prohibited pharmaceuticals ) .
* General Smuggling ( including the trafficking in stolen art and antiquities ; violations of the Endangered Species Act etc .
) * Intellectual property rights violations ( including music and software ) .
* Immigration violations ; identity and benefit fraud The phrase " images of child abuse " is telling .
This is how the professional in law enforcement defines child pornography.Operation Mango -- An extensive investigation that closed down an American-owned beachside resort in Acapulco , Mexico , which offered children to sexual predators .
The resort was a haven for pedophiles that traveled to the facility for the sole purpose of engaging in sex with minors .
The proprietor of the business was convicted .
As a result of this investigation and others , the government of Mexico recently created a Federal task force to address crimes against children in its country .
Cyber Crimes Center [ ice.gov ] The VGTF is an international alliance of law enforcement agencies from the U.S. , UK , Australia and Canada , working together to make the Internet a safer place ; to identify , locate and help children at risk ; and to hold those who commit on-line child abuse appropriately accountable .
On-line child abuse includes activities such as searching for , sharing and downloading images of children being physically and sexually abused and engaging children in chat rooms with the intention of committing sexual abuse both on and off-line .
The VGTF delivers innovative crime prevention and crime reduction initiatives to prevent and deter individuals from committing on-line child abuse.ICE also partners with several Non-Governmental Organizations , including the National center for Missing &amp; Exploited Children , Netsmartz , World Vision and Rape , Abuse and Incest National Network , to fight crimes against children .
Operation Predator [ ice.gov ]</tokentext>
<sentencetext>... suuuuuure. Purely as a novelty, the geek might ask himself what ICE is and what it does.U.S.
Immigration and Customs Enforcement [ice.gov] has quite a lot on its plate, as this list of Programs [ice.gov] would suggest.The Cyber Crimes Center (C3) Child Exploitation Section (CES) investigates the trans-border dimension of large-scale producers and distributors of images of child abuse, as well as individuals who travel in foreign commerce for the purpose of engaging in sex with minors.
The CES employs the latest technology to collect evidence and track the activities of individuals and organized groups who sexually exploit children through the use of websites, chat rooms, newsgroups, and peer-to-peer trading.
These investigative activities are organized under Operation Predator, a program managed by the CES.
The CES also conducts clandestine operations throughout the world to identify and apprehend violators.C3 brings the full range of ICE computer and forensic assets together in a single location to combat such Internet-related crimes as:* Possession, manufacture and distribution of images of child abuse.
* International money laundering and illegal cyber-banking.
* Illegal arms trafficking and illegal export of strategic/controlled commodities.
* Drug trafficking (including prohibited pharmaceuticals).
* General Smuggling (including the trafficking in stolen art and antiquities; violations of the Endangered Species Act etc.
)* Intellectual property rights violations (including music and software).
* Immigration violations; identity and benefit fraud The phrase "images of child abuse" is telling.
This is how the professional in law enforcement defines child pornography.Operation Mango  -- An extensive investigation that closed down an American-owned beachside resort in Acapulco, Mexico, which offered children to sexual predators.
The resort was a haven for pedophiles that traveled to the facility for the sole purpose of engaging in sex with minors.
The proprietor of the business was convicted.
As a result of this investigation and others, the government of Mexico recently created a Federal task force to address crimes against children in its country.
Cyber Crimes Center [ice.gov] The VGTF is an international alliance of law enforcement agencies from the U.S., UK, Australia and Canada, working together to make the Internet a safer place; to identify, locate and help children at risk; and to hold those who commit on-line child abuse appropriately accountable.
On-line child abuse includes activities such as searching for, sharing and downloading images of children being physically and sexually abused and engaging children in chat rooms with the intention of committing sexual abuse both on and off-line.
The VGTF delivers innovative crime prevention and crime reduction initiatives to prevent and deter individuals from committing on-line child abuse.ICE also partners with several Non-Governmental Organizations, including the National center for Missing &amp; Exploited Children, Netsmartz, World Vision and Rape, Abuse and Incest National Network, to fight crimes against children.
Operation Predator [ice.gov]</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149546</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150298</id>
	<title>Re:And the problem with this is???</title>
	<author>commodore64\_love</author>
	<datestamp>1257077220000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>4</modscore>
	<htmltext><p>&gt;&gt;&gt;There is nothing wrong with this legally.</p><p>Nope.  Searches performed with the permission of a judge (warrant) are perfectly legal.  -----   That's fine.  It's the law that needs to be changed.  IMHO there should actually be three stages - childhood, teenager, and adulthood.   Then we'd no longer have the nonsense of teenaged boy/girlfriends being charged for "child porn" simply because they took photos of their own bodies.   (For that matter nudity shouldn't even be illegal, regardless of age.)</p><p>&gt;&gt;&gt;wiretap without a warrant is what I am worried about.</p><p>Agreed,  As Judge Napolitano keeps repeating, the Patriot Act gives federal cops the ability to write their own warrants, without need to stand before a judge and swear an oath.  That's just plain ridiculous.</p></htmltext>
<tokenext>&gt; &gt; &gt; There is nothing wrong with this legally.Nope .
Searches performed with the permission of a judge ( warrant ) are perfectly legal .
----- That 's fine .
It 's the law that needs to be changed .
IMHO there should actually be three stages - childhood , teenager , and adulthood .
Then we 'd no longer have the nonsense of teenaged boy/girlfriends being charged for " child porn " simply because they took photos of their own bodies .
( For that matter nudity should n't even be illegal , regardless of age .
) &gt; &gt; &gt; wiretap without a warrant is what I am worried about.Agreed , As Judge Napolitano keeps repeating , the Patriot Act gives federal cops the ability to write their own warrants , without need to stand before a judge and swear an oath .
That 's just plain ridiculous .</tokentext>
<sentencetext>&gt;&gt;&gt;There is nothing wrong with this legally.Nope.
Searches performed with the permission of a judge (warrant) are perfectly legal.
-----   That's fine.
It's the law that needs to be changed.
IMHO there should actually be three stages - childhood, teenager, and adulthood.
Then we'd no longer have the nonsense of teenaged boy/girlfriends being charged for "child porn" simply because they took photos of their own bodies.
(For that matter nudity shouldn't even be illegal, regardless of age.
)&gt;&gt;&gt;wiretap without a warrant is what I am worried about.Agreed,  As Judge Napolitano keeps repeating, the Patriot Act gives federal cops the ability to write their own warrants, without need to stand before a judge and swear an oath.
That's just plain ridiculous.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149794</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153024</id>
	<title>Re:Nit-picking the article</title>
	<author>falconwolf</author>
	<datestamp>1257097200000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><i>There are actually 95 typable characters on a US keyboard. (26 letters + 10 numbers +11 symbols) x2 (with shift key) + spacebar.</i></p><p>There are 112 typeable characters on the keyboard of my Mac.  I can also type special characters such as those with accents, diphthongs, umlauts, and others.  When I want to I can type "Fran&#231;ais" and "hola!" and "&#223;".  There are literally hundreds of others I can type as well.  However do encryption programs allow them to be used?</p><p>&#198; &#202;       OE &#216; &#240;</p><p>

Falcon</p></htmltext>
<tokenext>There are actually 95 typable characters on a US keyboard .
( 26 letters + 10 numbers + 11 symbols ) x2 ( with shift key ) + spacebar.There are 112 typeable characters on the keyboard of my Mac .
I can also type special characters such as those with accents , diphthongs , umlauts , and others .
When I want to I can type " Fran   ais " and " hola !
" and "   " .
There are literally hundreds of others I can type as well .
However do encryption programs allow them to be used ?     OE     Falcon</tokentext>
<sentencetext>There are actually 95 typable characters on a US keyboard.
(26 letters + 10 numbers +11 symbols) x2 (with shift key) + spacebar.There are 112 typeable characters on the keyboard of my Mac.
I can also type special characters such as those with accents, diphthongs, umlauts, and others.
When I want to I can type "Français" and "hola!
" and "ß".
There are literally hundreds of others I can type as well.
However do encryption programs allow them to be used?Æ Ê       OE Ø ð

Falcon</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150362</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151674</id>
	<title>Re:Call me paranoid, but</title>
	<author>martin-boundary</author>
	<datestamp>1257084900000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>This seems like waaaay overkill. Couldn't they just, like, kidnap the suspects overnight and torture them until they confess about the child porn already?</htmltext>
<tokenext>This seems like waaaay overkill .
Could n't they just , like , kidnap the suspects overnight and torture them until they confess about the child porn already ?</tokentext>
<sentencetext>This seems like waaaay overkill.
Couldn't they just, like, kidnap the suspects overnight and torture them until they confess about the child porn already?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149546</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149586</id>
	<title>Re:Call me paranoid, but</title>
	<author>Valdrax</author>
	<datestamp>1257074520000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><div class="quote"><p><div class="quote"><p>Naturally this is only being used to break encryption on computers seized with a warrant and suspected of harboring child pornography.</p></div><p>... suuuuuure.</p></div><p>Oooh,  meta-sarcasm!  How impressive!</p></div>
	</htmltext>
<tokenext>Naturally this is only being used to break encryption on computers seized with a warrant and suspected of harboring child pornography.... suuuuuure.Oooh , meta-sarcasm !
How impressive !</tokentext>
<sentencetext>Naturally this is only being used to break encryption on computers seized with a warrant and suspected of harboring child pornography.... suuuuuure.Oooh,  meta-sarcasm!
How impressive!
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149546</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150988</id>
	<title>Re:And the problem with this is???</title>
	<author>Anonymous</author>
	<datestamp>1257080880000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>What is wrong with computers being searched after a search warrant is issued?  You never been searched.</p><p>Stating someone has something on their computer based on an E-Mail (or a phone call) a former employer claims to have been sent by them, by police who do not know what Mail Logs, DNS records, Mail headers, Mail Servers, or that there is more than one Mail Client, and other information which is over looked by Judges and Police who do not understand nor care to understand about computers, is the problem.</p><p>In one case in Calgary, the police allowed the former employer to 'help' search those computers.  The same Police also failed to check on any information listed in the E-Mail (or phone call) to be factual.  They went forward in searching the home, and current place of employment, instead of validating the information.</p><p>There are lots of reasons why the contents of someone's personal computer or information should be used to get the warrant, instead of asking for a warrant to 'fish' for information.</p><p>There are real world examples we can talked about on Slashdot, however, none of them ever get posted.</p></htmltext>
<tokenext>What is wrong with computers being searched after a search warrant is issued ?
You never been searched.Stating someone has something on their computer based on an E-Mail ( or a phone call ) a former employer claims to have been sent by them , by police who do not know what Mail Logs , DNS records , Mail headers , Mail Servers , or that there is more than one Mail Client , and other information which is over looked by Judges and Police who do not understand nor care to understand about computers , is the problem.In one case in Calgary , the police allowed the former employer to 'help ' search those computers .
The same Police also failed to check on any information listed in the E-Mail ( or phone call ) to be factual .
They went forward in searching the home , and current place of employment , instead of validating the information.There are lots of reasons why the contents of someone 's personal computer or information should be used to get the warrant , instead of asking for a warrant to 'fish ' for information.There are real world examples we can talked about on Slashdot , however , none of them ever get posted .</tokentext>
<sentencetext>What is wrong with computers being searched after a search warrant is issued?
You never been searched.Stating someone has something on their computer based on an E-Mail (or a phone call) a former employer claims to have been sent by them, by police who do not know what Mail Logs, DNS records, Mail headers, Mail Servers, or that there is more than one Mail Client, and other information which is over looked by Judges and Police who do not understand nor care to understand about computers, is the problem.In one case in Calgary, the police allowed the former employer to 'help' search those computers.
The same Police also failed to check on any information listed in the E-Mail (or phone call) to be factual.
They went forward in searching the home, and current place of employment, instead of validating the information.There are lots of reasons why the contents of someone's personal computer or information should be used to get the warrant, instead of asking for a warrant to 'fish' for information.There are real world examples we can talked about on Slashdot, however, none of them ever get posted.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149794</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150564</id>
	<title>Re:Nit-picking the article</title>
	<author>DrXym</author>
	<datestamp>1257078600000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><i>The real smart crooks encrypt their stuff in a way that nothing short of banging them over the head with a $5 pipe wrench will ever reveal.</i>
<p>
For every smart crook there are probably ten really stupid ones, and another ten who think they're smart but really aren't. Besides if someone really did use strong encryption, I am sure that law enforcement have more expensive means to obtain evidence, such as sending the hard disk off for analysis, or even renting computing time on faster hardware.</p></htmltext>
<tokenext>The real smart crooks encrypt their stuff in a way that nothing short of banging them over the head with a $ 5 pipe wrench will ever reveal .
For every smart crook there are probably ten really stupid ones , and another ten who think they 're smart but really are n't .
Besides if someone really did use strong encryption , I am sure that law enforcement have more expensive means to obtain evidence , such as sending the hard disk off for analysis , or even renting computing time on faster hardware .</tokentext>
<sentencetext>The real smart crooks encrypt their stuff in a way that nothing short of banging them over the head with a $5 pipe wrench will ever reveal.
For every smart crook there are probably ten really stupid ones, and another ten who think they're smart but really aren't.
Besides if someone really did use strong encryption, I am sure that law enforcement have more expensive means to obtain evidence, such as sending the hard disk off for analysis, or even renting computing time on faster hardware.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149718</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149844</id>
	<title>Re:Nice move Sony</title>
	<author>Anonymous</author>
	<datestamp>1257075480000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Sony loses money on each PS3 sold.  If the government isn't buying any games, then this is a loss for Sony.</p></htmltext>
<tokenext>Sony loses money on each PS3 sold .
If the government is n't buying any games , then this is a loss for Sony .</tokentext>
<sentencetext>Sony loses money on each PS3 sold.
If the government isn't buying any games, then this is a loss for Sony.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149566</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150076</id>
	<title>4 million passwords?  Umm, no.</title>
	<author>Anonymous</author>
	<datestamp>1257076380000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>As we all most likely know, It would be impossible* to actually try 4 million passwords per second.  I'd be willing to wager the actual headline should be:</p><p>"PS3s have been purchased to calculate 4 Million hash-table lookups per second."</p><p>Step 1: load hash table to RAM.<br>Step 2: let the brute force CPU bang away at it till it finds a match.</p><p>4MFLOPS seems much more likely.</p></htmltext>
<tokenext>As we all most likely know , It would be impossible * to actually try 4 million passwords per second .
I 'd be willing to wager the actual headline should be : " PS3s have been purchased to calculate 4 Million hash-table lookups per second .
" Step 1 : load hash table to RAM.Step 2 : let the brute force CPU bang away at it till it finds a match.4MFLOPS seems much more likely .</tokentext>
<sentencetext>As we all most likely know, It would be impossible* to actually try 4 million passwords per second.
I'd be willing to wager the actual headline should be:"PS3s have been purchased to calculate 4 Million hash-table lookups per second.
"Step 1: load hash table to RAM.Step 2: let the brute force CPU bang away at it till it finds a match.4MFLOPS seems much more likely.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152856</id>
	<title>Interesting...</title>
	<author>jonaskoelker</author>
	<datestamp>1257095040000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>So, with a brute force attack, I've only got 36,030,233,524,592,808,479,552,335 years before they will reach mine!</p></div><p>If that figure is accurate and (very) precise, I can actually go and compute what your password is<nobr> <wbr></nobr>;-)</p></div>
	</htmltext>
<tokenext>So , with a brute force attack , I 've only got 36,030,233,524,592,808,479,552,335 years before they will reach mine ! If that figure is accurate and ( very ) precise , I can actually go and compute what your password is ; - )</tokentext>
<sentencetext>So, with a brute force attack, I've only got 36,030,233,524,592,808,479,552,335 years before they will reach mine!If that figure is accurate and (very) precise, I can actually go and compute what your password is ;-)
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149716</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150236</id>
	<title>Diffrent approach.</title>
	<author>changa</author>
	<datestamp>1257076920000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><tt>Ok, leave the data in the cloud and&nbsp; travel with a laptop with a 100\% blank drive and an os install disk to use when you get there.</tt></htmltext>
<tokenext>Ok , leave the data in the cloud and   travel with a laptop with a 100 \ % blank drive and an os install disk to use when you get there .</tokentext>
<sentencetext>Ok, leave the data in the cloud and  travel with a laptop with a 100\% blank drive and an os install disk to use when you get there.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151724</id>
	<title>Re:Lovely encryption</title>
	<author>Anonymous</author>
	<datestamp>1257085260000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>No, no -- the submitter <em>succeeded</em>.<nobr> <wbr></nobr>/. summaries are a twit filter. Anyone who comments as if the summary was factual recieves a mild humiliation that will remind them to RTFA next time.</p></htmltext>
<tokenext>No , no -- the submitter succeeded .
/. summaries are a twit filter .
Anyone who comments as if the summary was factual recieves a mild humiliation that will remind them to RTFA next time .</tokentext>
<sentencetext>No, no -- the submitter succeeded.
/. summaries are a twit filter.
Anyone who comments as if the summary was factual recieves a mild humiliation that will remind them to RTFA next time.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149748</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30160840</id>
	<title>Legal Test?</title>
	<author>Niet3sche</author>
	<datestamp>1258660080000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>It sounds like these PS3s are being "reverse-engineered" to run "non-stock" software on them, vis-a-vis password cracking.
<br> <br>
I posit a direct and urgent need to determine two things:<br>
(1) Method of operation;<br>
(2) Scope and reach of the program.<br> <br>

This could make for an interesting legal test of DMCA/PATRIOT act laws.</htmltext>
<tokenext>It sounds like these PS3s are being " reverse-engineered " to run " non-stock " software on them , vis-a-vis password cracking .
I posit a direct and urgent need to determine two things : ( 1 ) Method of operation ; ( 2 ) Scope and reach of the program .
This could make for an interesting legal test of DMCA/PATRIOT act laws .</tokentext>
<sentencetext>It sounds like these PS3s are being "reverse-engineered" to run "non-stock" software on them, vis-a-vis password cracking.
I posit a direct and urgent need to determine two things:
(1) Method of operation;
(2) Scope and reach of the program.
This could make for an interesting legal test of DMCA/PATRIOT act laws.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30154128</id>
	<title>1535 billion years....</title>
	<author>Tord</author>
	<datestamp>1258626120000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Hm, 60 PS3s chrunching away at 4 million passwords per second each. Giving a total of 240 million passwords tested each second.</p><p>My TrueCrypt volume has a 19 character alphanumerical password, not truly random but nothing you can use a dictionary against. Only lowercase + numbers but still more than 30 characters to choose from.</p><p>Given that they knew all this and tried to brute force my password using their PS3s it would still take them more than 1535 billion years...</p><p>I think they need to up their game or go a totally different route if they ever want to be able to look inside my harddrive and prosecute me for any of its content before I'm burried in a chest...</p></htmltext>
<tokenext>Hm , 60 PS3s chrunching away at 4 million passwords per second each .
Giving a total of 240 million passwords tested each second.My TrueCrypt volume has a 19 character alphanumerical password , not truly random but nothing you can use a dictionary against .
Only lowercase + numbers but still more than 30 characters to choose from.Given that they knew all this and tried to brute force my password using their PS3s it would still take them more than 1535 billion years...I think they need to up their game or go a totally different route if they ever want to be able to look inside my harddrive and prosecute me for any of its content before I 'm burried in a chest.. .</tokentext>
<sentencetext>Hm, 60 PS3s chrunching away at 4 million passwords per second each.
Giving a total of 240 million passwords tested each second.My TrueCrypt volume has a 19 character alphanumerical password, not truly random but nothing you can use a dictionary against.
Only lowercase + numbers but still more than 30 characters to choose from.Given that they knew all this and tried to brute force my password using their PS3s it would still take them more than 1535 billion years...I think they need to up their game or go a totally different route if they ever want to be able to look inside my harddrive and prosecute me for any of its content before I'm burried in a chest...</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30156814</id>
	<title>Immaterial.</title>
	<author>Hasai</author>
	<datestamp>1258647960000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>What counts is how fast the target of such a brute-force attack <i>accepts </i>the passwords. If it only accepts one password every five seconds, guess what?</p><p>Idiot article.</p></htmltext>
<tokenext>What counts is how fast the target of such a brute-force attack accepts the passwords .
If it only accepts one password every five seconds , guess what ? Idiot article .</tokentext>
<sentencetext>What counts is how fast the target of such a brute-force attack accepts the passwords.
If it only accepts one password every five seconds, guess what?Idiot article.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30157570</id>
	<title>Wonder what they are doing....</title>
	<author>DrRiAdGeOrN</author>
	<datestamp>1258650120000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Wonder what the PS3's are being used for in between crack attempts.....</htmltext>
<tokenext>Wonder what the PS3 's are being used for in between crack attempts.... .</tokentext>
<sentencetext>Wonder what the PS3's are being used for in between crack attempts.....</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150242</id>
	<title>Re:Lovely encryption</title>
	<author>Monkeedude1212</author>
	<datestamp>1257076980000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I know eh?</p><p>It's ridiculous how I can't handcuff a drug dealer, stuff him into the backseat of my car, drive him back to my office, and record him alone in a room for about 12 hours before pressing charges.</p><p>It's a right no government arm should ever have!<br>Or its infringing upon my rights to say that I can't do it!</p><p>I don't care which! I'm just upset!</p></htmltext>
<tokenext>I know eh ? It 's ridiculous how I ca n't handcuff a drug dealer , stuff him into the backseat of my car , drive him back to my office , and record him alone in a room for about 12 hours before pressing charges.It 's a right no government arm should ever have ! Or its infringing upon my rights to say that I ca n't do it ! I do n't care which !
I 'm just upset !</tokentext>
<sentencetext>I know eh?It's ridiculous how I can't handcuff a drug dealer, stuff him into the backseat of my car, drive him back to my office, and record him alone in a room for about 12 hours before pressing charges.It's a right no government arm should ever have!Or its infringing upon my rights to say that I can't do it!I don't care which!
I'm just upset!</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149658</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152412</id>
	<title>Re:Hmmmm</title>
	<author>mrsteveman1</author>
	<datestamp>1257090240000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>2 factor auth, maybe even 3.</p><p>Every seen those little RSA keys that generate random time-sensitive numbers? I think Paypal might be using something similar. The password is standing out alone at the moment for most use cases, and it doesn't need to be.</p></htmltext>
<tokenext>2 factor auth , maybe even 3.Every seen those little RSA keys that generate random time-sensitive numbers ?
I think Paypal might be using something similar .
The password is standing out alone at the moment for most use cases , and it does n't need to be .</tokentext>
<sentencetext>2 factor auth, maybe even 3.Every seen those little RSA keys that generate random time-sensitive numbers?
I think Paypal might be using something similar.
The password is standing out alone at the moment for most use cases, and it doesn't need to be.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150566</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149716</id>
	<title>Wow, 4 million passwords per second...</title>
	<author>Animal Farm Pig</author>
	<datestamp>1257075000000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>3</modscore>
	<htmltext>So, with a brute force attack, I've only got 36,030,233,524,592,808,479,552,335 years before they will reach mine!</htmltext>
<tokenext>So , with a brute force attack , I 've only got 36,030,233,524,592,808,479,552,335 years before they will reach mine !</tokentext>
<sentencetext>So, with a brute force attack, I've only got 36,030,233,524,592,808,479,552,335 years before they will reach mine!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151166</id>
	<title>Re:What</title>
	<author>Anonymous</author>
	<datestamp>1257081900000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>    <b>   (Score:-1, Troll)</b><br>by commodore64\_love (1445365) Alter Relationship on Wednesday November 18, @05:25PM (#30149634)</p><p>Just curious:<nobr> <wbr></nobr>...how does one encrypt files with a password? Any free software available for that task?</p></div><p>   <b>Why is this marked troll?     </b>   Have the mods gone batty?</p></div>
	</htmltext>
<tokenext>( Score : -1 , Troll ) by commodore64 \ _love ( 1445365 ) Alter Relationship on Wednesday November 18 , @ 05 : 25PM ( # 30149634 ) Just curious : ...how does one encrypt files with a password ?
Any free software available for that task ?
Why is this marked troll ?
Have the mods gone batty ?</tokentext>
<sentencetext>       (Score:-1, Troll)by commodore64\_love (1445365) Alter Relationship on Wednesday November 18, @05:25PM (#30149634)Just curious: ...how does one encrypt files with a password?
Any free software available for that task?
Why is this marked troll?
Have the mods gone batty?
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149634</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153946</id>
	<title>Re:How does this work?</title>
	<author>SheeEttin</author>
	<datestamp>1258623120000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Because they aren't asking the computer, "Hey, is this the password? No? Well, how about this?" They're taking the encryption algorithm and running possible passwords through it to see if the resulting hash matches the one it needs.<br>
Or at least that's how some brute-force methods work. (It also assumes you have access to the hashing algorithm. If they don't, they probably have a special version of the program that doesn't do any locking out.) Oh, and sorry if anything is factually incorrect here, it's 3 AM and I should be sleeping.
<br> <br>
I wonder if they're also using (or generating) rainbow tables. A couple PS3s and a whole lot of disk space is probably a lot cheaper than several PS3s working case-by-case.</htmltext>
<tokenext>Because they are n't asking the computer , " Hey , is this the password ?
No ? Well , how about this ?
" They 're taking the encryption algorithm and running possible passwords through it to see if the resulting hash matches the one it needs .
Or at least that 's how some brute-force methods work .
( It also assumes you have access to the hashing algorithm .
If they do n't , they probably have a special version of the program that does n't do any locking out .
) Oh , and sorry if anything is factually incorrect here , it 's 3 AM and I should be sleeping .
I wonder if they 're also using ( or generating ) rainbow tables .
A couple PS3s and a whole lot of disk space is probably a lot cheaper than several PS3s working case-by-case .</tokentext>
<sentencetext>Because they aren't asking the computer, "Hey, is this the password?
No? Well, how about this?
" They're taking the encryption algorithm and running possible passwords through it to see if the resulting hash matches the one it needs.
Or at least that's how some brute-force methods work.
(It also assumes you have access to the hashing algorithm.
If they don't, they probably have a special version of the program that doesn't do any locking out.
) Oh, and sorry if anything is factually incorrect here, it's 3 AM and I should be sleeping.
I wonder if they're also using (or generating) rainbow tables.
A couple PS3s and a whole lot of disk space is probably a lot cheaper than several PS3s working case-by-case.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150456</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150854</id>
	<title>The cell</title>
	<author>Anonymous</author>
	<datestamp>1257080100000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>1</modscore>
	<htmltext><p>It amazes me with things like the IBM QS21 and the mercury blade servers that the cheapest solution is to get a piece of hardware like the ps3 with so many extra components not needed for number crunching.</p><p>The cell was designed for floating point calculations. Cracking requires a lot of integer calculations. You won't get the benefits that science and graphic applications get like folding@home.</p></htmltext>
<tokenext>It amazes me with things like the IBM QS21 and the mercury blade servers that the cheapest solution is to get a piece of hardware like the ps3 with so many extra components not needed for number crunching.The cell was designed for floating point calculations .
Cracking requires a lot of integer calculations .
You wo n't get the benefits that science and graphic applications get like folding @ home .</tokentext>
<sentencetext>It amazes me with things like the IBM QS21 and the mercury blade servers that the cheapest solution is to get a piece of hardware like the ps3 with so many extra components not needed for number crunching.The cell was designed for floating point calculations.
Cracking requires a lot of integer calculations.
You won't get the benefits that science and graphic applications get like folding@home.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150762</id>
	<title>Re:How does this work?</title>
	<author>appleguru</author>
	<datestamp>1257079680000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>For a typical operating system, it'd involve extracting the password hash from the target disk, and then running a program (like john) that takes text inputs (bruteforced or from a wordlist) and hashes them, and then compares the hashes and sees if they match. It is a bit more complicated than that (salts, etc), especially in a forensic environment where data integrity must be preserved, but that's the idea.</p><p>The methodology is similar for encrypted files/filesystems/etc, but it all relies on knowing how the authentication takes place so it can mimic it, quickly.</p></htmltext>
<tokenext>For a typical operating system , it 'd involve extracting the password hash from the target disk , and then running a program ( like john ) that takes text inputs ( bruteforced or from a wordlist ) and hashes them , and then compares the hashes and sees if they match .
It is a bit more complicated than that ( salts , etc ) , especially in a forensic environment where data integrity must be preserved , but that 's the idea.The methodology is similar for encrypted files/filesystems/etc , but it all relies on knowing how the authentication takes place so it can mimic it , quickly .</tokentext>
<sentencetext>For a typical operating system, it'd involve extracting the password hash from the target disk, and then running a program (like john) that takes text inputs (bruteforced or from a wordlist) and hashes them, and then compares the hashes and sees if they match.
It is a bit more complicated than that (salts, etc), especially in a forensic environment where data integrity must be preserved, but that's the idea.The methodology is similar for encrypted files/filesystems/etc, but it all relies on knowing how the authentication takes place so it can mimic it, quickly.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150456</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149520</id>
	<title>What</title>
	<author>Anonymous</author>
	<datestamp>1257074220000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>4</modscore>
	<htmltext><p><div class="quote"><p>being used to break encryption</p></div><p><div class="quote"><p>Each PS3 is capable of 4 million passwords per second</p></div><p>Something doesn't match up. For first the different encryption schemes take different times to try even one password, and even more if you combine several of them together. Secondly you cannot try 4 million passwords in a second if its encrypted content, it takes a lot more than that.</p></div>
	</htmltext>
<tokenext>being used to break encryptionEach PS3 is capable of 4 million passwords per secondSomething does n't match up .
For first the different encryption schemes take different times to try even one password , and even more if you combine several of them together .
Secondly you can not try 4 million passwords in a second if its encrypted content , it takes a lot more than that .</tokentext>
<sentencetext>being used to break encryptionEach PS3 is capable of 4 million passwords per secondSomething doesn't match up.
For first the different encryption schemes take different times to try even one password, and even more if you combine several of them together.
Secondly you cannot try 4 million passwords in a second if its encrypted content, it takes a lot more than that.
	</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30154540</id>
	<title>Re:How does this work?</title>
	<author>selven</author>
	<datestamp>1258632720000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>It's an encryption algorithm they're breaking, not an OS. With an encryption algorithm you have the ciphertext and you're trying to find the key and the plaintext. There is no opportunity for the ciphertext owner to inject software that imposes those kinds of restrictions.</p></htmltext>
<tokenext>It 's an encryption algorithm they 're breaking , not an OS .
With an encryption algorithm you have the ciphertext and you 're trying to find the key and the plaintext .
There is no opportunity for the ciphertext owner to inject software that imposes those kinds of restrictions .</tokentext>
<sentencetext>It's an encryption algorithm they're breaking, not an OS.
With an encryption algorithm you have the ciphertext and you're trying to find the key and the plaintext.
There is no opportunity for the ciphertext owner to inject software that imposes those kinds of restrictions.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150456</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153550</id>
	<title>Re:Nice move Sony</title>
	<author>sandGorgons</author>
	<datestamp>1257104520000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>ahh.. but the publicity.

Every real boy wants the box that is used by the Men-in-Black .</htmltext>
<tokenext>ahh.. but the publicity .
Every real boy wants the box that is used by the Men-in-Black .</tokentext>
<sentencetext>ahh.. but the publicity.
Every real boy wants the box that is used by the Men-in-Black .</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149844</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149794</id>
	<title>And the problem with this is???</title>
	<author>LWATCDR</author>
	<datestamp>1257075240000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>3</modscore>
	<htmltext><p>Really what is the problem with this. These computers are being searched AFTER a judge issues a search warrant. In other words constitutional law is being followed to the letter in this case.<br>So what is the problem? Because it may involve child porn and you think that it is harmless? Well some of those computers have pictures of the victims "children" and the criminal act happening.<br>There is nothing wrong with this legally.<br>And having a fit about it is a clear case of calling wolf.<br>I am sure this will be used in any investigation that involves a computer and not just for child porn.<br>Complaining about the legal search of a computer after a warrant is issued is just stupid.</p><p>BTW I am sure that the NSA has much better systems based on FPGAs and Cell chips for breaking encryption than PS-3s but we will never hear about those and that type of wiretap without a warrant is what I am worried about.</p></htmltext>
<tokenext>Really what is the problem with this .
These computers are being searched AFTER a judge issues a search warrant .
In other words constitutional law is being followed to the letter in this case.So what is the problem ?
Because it may involve child porn and you think that it is harmless ?
Well some of those computers have pictures of the victims " children " and the criminal act happening.There is nothing wrong with this legally.And having a fit about it is a clear case of calling wolf.I am sure this will be used in any investigation that involves a computer and not just for child porn.Complaining about the legal search of a computer after a warrant is issued is just stupid.BTW I am sure that the NSA has much better systems based on FPGAs and Cell chips for breaking encryption than PS-3s but we will never hear about those and that type of wiretap without a warrant is what I am worried about .</tokentext>
<sentencetext>Really what is the problem with this.
These computers are being searched AFTER a judge issues a search warrant.
In other words constitutional law is being followed to the letter in this case.So what is the problem?
Because it may involve child porn and you think that it is harmless?
Well some of those computers have pictures of the victims "children" and the criminal act happening.There is nothing wrong with this legally.And having a fit about it is a clear case of calling wolf.I am sure this will be used in any investigation that involves a computer and not just for child porn.Complaining about the legal search of a computer after a warrant is issued is just stupid.BTW I am sure that the NSA has much better systems based on FPGAs and Cell chips for breaking encryption than PS-3s but we will never hear about those and that type of wiretap without a warrant is what I am worried about.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152422</id>
	<title>Re:How does this work?</title>
	<author>Anonymous</author>
	<datestamp>1257090300000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>They have probably retrieved the hash of the password and are now trying to match a password to that hash.</p></htmltext>
<tokenext>They have probably retrieved the hash of the password and are now trying to match a password to that hash .</tokentext>
<sentencetext>They have probably retrieved the hash of the password and are now trying to match a password to that hash.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150456</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151086</id>
	<title>Re:Nit-picking the article</title>
	<author>Anonymous</author>
	<datestamp>1257081420000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>another option is to google the password.  there are several lists that have combination of windows hash to corresponding password try 5cfc0053de208a45640631e0fa8d82f0</p></htmltext>
<tokenext>another option is to google the password .
there are several lists that have combination of windows hash to corresponding password try 5cfc0053de208a45640631e0fa8d82f0</tokentext>
<sentencetext>another option is to google the password.
there are several lists that have combination of windows hash to corresponding password try 5cfc0053de208a45640631e0fa8d82f0</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149718</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153176</id>
	<title>Truecrypt is not open source</title>
	<author>falconwolf</author>
	<datestamp>1257098940000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p> <a href="http://www.truecrypt.org/" title="truecrypt.org">TrueCrypt</a> [truecrypt.org] is open source and is available for download from <a href="http://sourceforge.net/projects/truecrypt/" title="sourceforge.net">Source Forge</a> [sourceforge.net], which hosts open source projects.  And here's the downloadable <a href="http://www.truecrypt.org/downloads2" title="truecrypt.org">source code</a> [truecrypt.org].</p><p>

Falcon</p></htmltext>
<tokenext>TrueCrypt [ truecrypt.org ] is open source and is available for download from Source Forge [ sourceforge.net ] , which hosts open source projects .
And here 's the downloadable source code [ truecrypt.org ] .
Falcon</tokentext>
<sentencetext> TrueCrypt [truecrypt.org] is open source and is available for download from Source Forge [sourceforge.net], which hosts open source projects.
And here's the downloadable source code [truecrypt.org].
Falcon</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150058</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149884</id>
	<title>Re:Call me paranoid, but</title>
	<author>Groo Wanderer</author>
	<datestamp>1257075660000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p><div class="quote"><p>Naturally this is only being used to break encryption on computers seized with a warrant and suspected of harboring child pornography.</p></div><p>... suuuuuure.</p></div><p>No really, it is true. The guys that don't follow the law get much better funding, and they can afford to make their own custom ASICs to do it much faster. It is only the ones that take the silly 'legal route' that have to scrimp and save like this.</p><p>
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; -Charlie</p></div>
	</htmltext>
<tokenext>Naturally this is only being used to break encryption on computers seized with a warrant and suspected of harboring child pornography.... suuuuuure.No really , it is true .
The guys that do n't follow the law get much better funding , and they can afford to make their own custom ASICs to do it much faster .
It is only the ones that take the silly 'legal route ' that have to scrimp and save like this .
                    -Charlie</tokentext>
<sentencetext>Naturally this is only being used to break encryption on computers seized with a warrant and suspected of harboring child pornography.... suuuuuure.No really, it is true.
The guys that don't follow the law get much better funding, and they can afford to make their own custom ASICs to do it much faster.
It is only the ones that take the silly 'legal route' that have to scrimp and save like this.
                    -Charlie
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149546</parent>
</comment>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_98</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149718
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153222
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_69</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149658
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150220
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_14</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149718
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150984
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_74</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149566
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149844
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153550
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_48</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150456
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152242
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_51</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149604
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152738
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_103</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149604
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149790
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_42</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149794
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153934
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_65</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150566
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30165070
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_38</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149658
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152060
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_102</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149794
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153838
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_41</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149718
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150030
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30157500
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_99</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150456
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152558
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_32</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149718
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153452
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_15</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149546
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151674
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_4</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149794
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150032
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_89</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150456
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30158772
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_3</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149718
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151086
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_71</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150566
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152412
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_96</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149576
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150318
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_12</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149520
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149634
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149804
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152442
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_108</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149628
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150262
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_64</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149658
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150242
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_35</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150456
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30154052
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_101</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149718
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150030
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151340
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_40</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150456
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30154536
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_63</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150456
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152444
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_54</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150456
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153424
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_25</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150566
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151064
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_30</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149546
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150324
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_9</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149658
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153884
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_88</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149716
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150746
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_2</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149716
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150350
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_93</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150456
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153246
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_18</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149642
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30154648
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_78</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150456
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152722
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_107</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149794
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150988
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_55</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149520
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149634
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150256
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_83</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150566
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30165210
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_57</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149716
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150172
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_106</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149546
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149884
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_62</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150456
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151946
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_33</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149718
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150576
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_24</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149546
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153420
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_19</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149566
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149844
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151058
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_47</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150076
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151944
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_8</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150456
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30154540
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_52</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149718
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150564
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_23</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149604
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152812
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_7</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149520
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149634
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151348
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_75</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149718
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150030
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30169118
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_20</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149566
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149844
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150584
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_91</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150566
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30158982
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_16</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149658
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150570
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_82</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149658
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150146
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_68</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150566
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30182564
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_39</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150566
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152416
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_105</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149546
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152720
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_81</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149794
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150036
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151486
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_44</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149604
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149866
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_72</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149566
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152732
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_67</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150456
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152422
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_46</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150566
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30156534
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_29</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150566
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30158892
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30159872
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_110</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149520
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149634
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149980
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_22</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149718
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150560
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_45</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149520
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149634
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149744
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_6</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149718
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150362
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153024
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_36</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149718
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150030
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151270
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_100</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150058
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151756
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_97</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149718
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151424
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_13</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150566
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30154688
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_73</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149520
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149634
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149768
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151716
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_87</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149794
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151068
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_1</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149718
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153798
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_80</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149718
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150030
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30154824
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_66</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149716
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151662
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_94</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149520
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149622
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150688
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_37</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150456
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150762
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_28</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150566
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30154164
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30159484
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_10</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150386
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30156818
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_70</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149718
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150030
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152172
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_31</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149604
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149722
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_56</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149604
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149998
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_27</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150436
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152714
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_58</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149520
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149634
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153720
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_79</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149546
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149586
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_61</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149604
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149710
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_34</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149658
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153272
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_95</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149546
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150626
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151088
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_86</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150436
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30154002
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30155212
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30155694
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_11</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150456
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152546
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_0</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150436
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30154002
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30154752
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_109</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149604
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150108
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_85</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150566
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30155198
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_76</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149800
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149914
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_59</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149658
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149748
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151724
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_90</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149520
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149634
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151166
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30155850
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_92</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150456
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152194
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_53</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150058
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151282
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_26</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150456
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153946
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_49</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149716
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152856
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_104</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149718
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150776
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_60</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150058
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153176
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_43</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149628
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30157946
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_17</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149794
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150298
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_77</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149566
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152148
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_111</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150456
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150768
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_50</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149946
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150402
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_21</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149546
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149890
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_5</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149718
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150836
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_11_18_2149202_84</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149794
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153410
</commentlist>
</thread>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_18_2149202.5</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149628
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150262
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30157946
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_18_2149202.8</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149794
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150032
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150036
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151486
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150988
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151068
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153934
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150298
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153410
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153838
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_18_2149202.23</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149604
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152812
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149790
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149710
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149722
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150108
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149998
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152738
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149866
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_18_2149202.22</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149520
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149622
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150688
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149634
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151166
---http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30155850
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153720
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149744
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149768
---http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151716
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149804
---http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152442
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151348
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150256
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149980
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_18_2149202.3</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150436
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152714
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30154002
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30154752
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30155212
---http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30155694
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_18_2149202.6</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150566
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30154688
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30154164
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30159484
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152412
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152416
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30155198
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30182564
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151064
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30158982
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30156534
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30158892
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30159872
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30165070
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30165210
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_18_2149202.20</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151196
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_18_2149202.9</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149546
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149884
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152720
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149890
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153420
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151674
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149586
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150626
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151088
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150324
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_18_2149202.27</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149658
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152060
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150220
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150570
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150146
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150242
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153272
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153884
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149748
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151724
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_18_2149202.7</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150236
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_18_2149202.0</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149566
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152148
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152732
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149844
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151058
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153550
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150584
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_18_2149202.21</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150854
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_18_2149202.1</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149642
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30154648
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_18_2149202.19</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149880
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_18_2149202.13</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149538
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_18_2149202.11</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150456
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153946
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30154052
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150768
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152422
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152242
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152194
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152444
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30154540
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150762
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153424
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153246
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152546
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151946
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30154536
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152558
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30158772
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152722
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_18_2149202.14</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150076
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151944
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_18_2149202.17</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151010
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_18_2149202.12</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151324
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_18_2149202.15</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149946
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150402
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_18_2149202.26</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150650
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_18_2149202.18</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150386
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30156818
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_18_2149202.24</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149576
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150318
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_18_2149202.16</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149716
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150172
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150350
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150746
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151662
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152856
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_18_2149202.4</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150058
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151282
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151756
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153176
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_18_2149202.2</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149800
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149914
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_18_2149202.10</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30149718
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151086
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153798
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153452
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150030
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30169118
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30154824
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30152172
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151270
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30157500
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151340
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153222
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150776
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150576
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150564
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150836
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151424
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150560
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150362
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30153024
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30150984
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_11_18_2149202.25</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_11_18_2149202.30151936
</commentlist>
</conversation>
