Blocked Beauty: Town Covers Up Mount Fuji To Keep Tourists Away [Roundup]

News and notes from around the interweb:

About Gary Leff

Gary Leff is one of the foremost experts in the field of miles, points, and frequent business travel - a topic he has covered since 2002. Co-founder of frequent flyer community InsideFlyer.com, emcee of the Freddie Awards, and named one of the "World's Top Travel Experts" by Conde' Nast Traveler (2010-Present) Gary has been a guest on most major news media, profiled in several top print publications, and published broadly on the topic of consumer loyalty. More About Gary »

More articles by Gary Leff »

Comments

  1. Isn’t lying about data breaches involving personal information a criminal offense?

  2. The Marriott encryption story is the much bigger deal. It’s up there with Hertz arresting their own customers and it deserves its own post.

  3. I wonder how Afghanistan would feel about married women visiting without their husbands?

  4. Yes, SHA-1 is insecure. But the deal about a hash vs. encryption is a red herring. For things like passwords you normally would use a hash, not encryption.

    Trying not to get to get too technical, but given a hash you can’t reverse the process to get the original data. All you can do is try passwords until one passes. With encryption you can de-encrypt the stored data to get the original values.

  5. Lancaster: Take frequent Amtrak Keystone service to Philadelphia 30th St. Station, then SEPTA Airport Line to Philadelphia International Airport; or, stay on Amtrak past Philadelphia to the Newark Airport Rail Station. Easy.

  6. I second @Bill on the hash vs. encryption thing.

    The difference between the two is just so massive that without more details about how they were being used, it’s impossible to know the implications. It sounds, to me, like the journalist and, frankly, the lawyers and judge may not really understand the arguments they’re making.

    It’s not good that Marriott didn’t know what they were using, but I wouldn’t jump to any conclusions about the consequences. (Yes, SHA-1 is broken, but it may not be broken in a way that matters here…)

Comments are closed.