Subj : Three Questions of Effectiveness To : All From : warmfuzzy Date : Tue May 21 2019 06:41:53 These following three things have been in my mind for some time now. Are they still effective or are they not? 1. TEMPEST Hacking 2. Encryption, Traditional 3. Closed-Source Software TEMPEST is the use of signal emissions from electronics to be able to see computer screens at a distance by reconstructing those emissions to reconstruct the images on the screen TRADITIONAL ENCRYPTION is public and symmetric encryption methods, one using a shared key and the other using a secret key. With the advent of the first comercially produced quantum computer from IBM this past year do we have to reconsider our use of traditional cryptographic methods? CLOSED-SOURCE SOFTWARE is non-peer-reviewed software that trys to implement security by the us of obscurity. Its true that its difficult to reverse-engineer software, but it certainly can be done with an interactive disassembler. So ... effective or pooched? What's the word? -warmfuzzy --- Mystic BBS v1.12 A39 2018/04/21 (Linux/64) * Origin: Sp00knet Master Hub [PHATstar] (700:100/0) .