Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×

+ - 617 Man charged for not giving up phone password at border->

Submitted by wired_parrot
wired_parrot (768394) writes "Canadian customs official charged a 38-year old man with obstruction of justice after he refused to give up his Blackberry phone password while crossing the US-Canada border. As this a question that has not yet been litigated in Canadian courts, it may establish a legal precedent for future cases."
Link to Original Source

+ - 635 Facebook rant lands US man in UAE jail->

Submitted by blindbat
blindbat (189141) writes "While back home in the US, a man working in the United Arab Emirites posted negative comments about the company he worked for. Upon returning to the country to resign, he was arrested and now faces up to a year in prison under their strict "cyber slander" laws designed to protect reputation."
Link to Original Source

+ - 168 First Fully Digital Radio Transmitter Built Purely From Microprocessor Tech->

Submitted by Zothecula
Zothecula (1870348) writes "For the first time in history, a prototype radio has been created that is claimed to be completely digital, generating high-frequency radio waves purely through the use of integrated circuits and a set of patented algorithms without using conventional analog radio circuits in any way whatsoever. This breakthrough technology promises to vastly improve the wireless communications capabilities of everything from 5G mobile technology to the multitude devices aimed at supporting the Internet of Things (IoT)."
Link to Original Source

+ - 166 Intel Reveals Unlocked, Socketed Broadwell CPU And Core i7 NUC w/ Iris Graphics->

Submitted by MojoKid
MojoKid (1002251) writes "Intel held an event at a location adjacent to GDC last night, where the company discussed some updates to its 5th Gen Core processor line-up, Intel graphics developments, the Intel Hardware SDK, and its various game developer tools. Chris Silva, Director of Marketing for Premium Notebook and Client Graphics teams disclosed a few details that a socketed, unlocked, 65W desktop processor based on Intel's Broadwell architecture, featuring Iris graphics, is due to arrive sometime in mid-2015. It's noteworthy because this will be Intel's first desktop CPU with Iris Pro graphics and because it is multiplier unlocked. It will be interesting to see what Iris Pro can do with some overclocking. Intel then showed off a new NUC mini PC powered by a 28W, quad-core Core i7 Broadwell processor, which also featured Iris graphics. The device has a tiny .63 liter enclosure with support for high-performance M.2 solid state drives and features an array of built-in IO options, like USB3, BT4, and 802.11ac WiFi. Bryan Langley, Principal PM for Windows Graphics also talked a bit about DirectX 12, disclosing that the company would be ready with DX12 support when Windows 10 arrives and that there are optimizations in DX12 and their drivers that would deliver performance enhancements to current and future Intel graphics platforms."
Link to Original Source

+ - 113 Major security flaw in Mac password system.->

Submitted by Anonymous Coward
An anonymous reader writes "CNET is putting a positive spin on a major security flaw in the Mac ecosystem. Apparently, Apple created a "feature" where if you forget the password to your Mac, simply pressing command R at boot up lets you into administrator settings allowing you to reset the computer's password. This is a great "feature" to forgetful owners, hackers, and thiefs alike."
Link to Original Source

+ - 179 Ask Slashdot: Why there is not a campaign against "Cloud Exclusive Hardware" ?

Submitted by martiniturbide
martiniturbide (1203660) writes "Today we can see a lot of hardware that is being sold that only works only against a cloud. There are many examples, like the Belkin NetCam HD+ (wifi webcam) that only works if you run it against their service (by seedonk) and if you don’t want to use their cloud, this hardware is useless. This is happening with a lot of new hardware and it does mean that you get the device cheap for being locked to their cloud, you are paying full price for this devices. On the internet there are just little groups trying to hack some of this hardware, but the consumer does not seems to care that if the manufacturer discontinue the service the hardware will be useless. Why there are no complains against this kind of hardware on the internet? Is it useless to fight “cloud exclusive hardware”? Should we care about it? Or we are so used to disposable hardware that we don’t care anymore?"

+ - 95 Coke trials solar powered shop and 3g mast in Rwanda ->

Submitted by Anonymous Coward
An anonymous reader writes "Coke has been running a program called Ekocentre for a couple of years in various remote areas around the world, through which it gives away a shipping container-like shop with a solar power system to poor female entrepreneurs. The latest one — and model for future shops — includes a 3g Base station for extending mobile network reach too."
Link to Original Source

+ - 102 Where's My Bioprinted Kidney, Already?->

Submitted by Anonymous Coward
An anonymous reader writes "Last November a news report in Russia Today sent a shudder of excitement through the tech blogs that cover 3D printing: an eccentric Russian provocateur claimed he would this month start printing functioning thyroids. Tech reporter Andrew Leonard set out to fact-check that claim, and along the way discovered an unlikely relationship between a Russian mad scientist and the U.S.’s most advanced, most respected 3d bioprinting companies—TeVido, which aims to 3D print custom nipples, and Organovo, which sells samples of 3D printed liver tissue. In the field of 3D printing, the line between science fiction and peer-reviewed research is very, very thin."
Link to Original Source

+ - 115 Culberson charges NASA with the 'development of the first interstellar rocket'->

Submitted by MarkWhittington
MarkWhittington (1084047) writes "Rep. John Culberson, R-Texas, the chair of the House Appropriations subcommittee that determines NASA funding, has been the driving force behind a mission to Jupiter’s moon Europa. However, according to a story in Space Policy Online, the congressman has an even greater challenge for the space agency. During a hearing on the FY 2016 NASA budget request, Culberson charged NASA Administrator Charles Bolden to further “the development of the first interstellar rocket propulsion system that would carry us to Alpha Centauri and beyond.” Culberson is very keen to start the exploration of exoplanets that have been discovered by the Kepler Space Telescope. Considering NASA's experiments in warp drive and the em drive, there may be some method to the congressman's madness."
Link to Original Source

+ - 197 Firefox 37 to check security certificates via blocklist->

Submitted by Anonymous Coward
An anonymous reader writes "The next version of Firefox will roll out [https://blog.mozilla.org/security/2015/03/03/revoking-intermediate-certificates-introducing-onecrl/] a ‘pushed’ blocklist of revoked intermediate security certificates, in an effort to avoid using 'live' Online Certificate Status Protocol (OCSP) checks. The 'OneCRL' feature is similar to Google Chrome's CRLSet [https://dev.chromium.org/Home/chromium-security/crlsets], but like that older offering, is limited to intermediate certificates, due to size restrictions in the browser. OneCRL will permit non-live verification on EV certificates, trading off currency for speed. Chrome pushes its trawled list of CA revocations every few hours, and Firefox seems set to follow that method and frequency. Both Firefox and Chrome developers admit that OCSP stapling would be the better solution, but it is currently only supported in 9% of TLS certificates."
Link to Original Source

+ - 154 Microsoft closes gap between Windows 10 and Xbox One with 'crossplay' plans->

Submitted by Anonymous Coward
An anonymous reader writes "In its attempt to make console gaming more accessible, Microsoft has announced that it will be developing universal apps which can run across Xbox One and Windows 10, as well as smartphones and other mobile devices using the upcoming OS. At the Game Developers Conference in San Francisco yesterday, Phil Spencer, head of Microsoft’s video games branch, said that the end-goal was to allow people to play games wherever they are over whichever platform they wish to use. Microsoft also announced that an adapter was currently being developed to hook up wireless Xbox One controllers to PCs. This latest move from the tech giant shows its push to grapple back its position in the mobile computing revolution, as the booming smartphone and tablet market shadows its longstanding desktop and laptop business."
Link to Original Source

+ - 173 Hosted web apps could solve Microsoft's Windows Phone problems->

Submitted by Mark Wilson
Mark Wilson (3799011) writes "Despite suggestions that the naming conventions used for Lumia devices is part of the reason for the low uptake of Windows Phone, the platform still has a serious problem when it comes to apps. Whether there is a real problem or not, the perception is that Windows Phone — or Windows 10 for Phones — is rather lacking in the app department. Fear not... Microsoft has a solution.

Rather than pumping out a glut of new apps of its own, or encouraging developers to produce third-party apps, Microsoft is adopting a slightly different tactic. At MWC 2015 this week the Lumia 640 and Lumia 640 XL were revealed, but Microsoft also announced that web apps will be permitted in the Windows store. Could this be what app-hungry consumers have been waiting for?"

Link to Original Source

+ - 102 Has The Antivirus Industry Gone Mad?!

Submitted by Anonymous Coward
An anonymous reader writes ""We have seen a concerning trend that is about to spiral out of control: Potentially Unwanted Programs (PUPs) are further on the rise. Whatâ(TM)s even more concerning is how they are spreading. After big vendors as Oracle (Java) and Microsoft (Bing and Skype) started bundling, now antivirus vendors have joined the game. We did research on some of the most popular PUP practices among the freeware antivirus vendors, and the results are quite disturbing.

PUPs want to get on your computer to make money off of you"

http://blog.emsisoft.com/2015/..."

+ - 168 Source 2 Will Also Be Free

Submitted by jones_supa
jones_supa (887896) writes "Valve is officially debuting its Source 2 engine at GDC this week alongside a host of other new technologies, and it's expected to launch at a competitive price: free. The news of its release coincides with Epic making Unreal Engine 4 free-to-download and Unity announcing a full-featured free version of Unity 5. Valve is making a show of marketing Source 2 not just to developers, but game creators of all stripes — including Steam Workshop creators. "With Source 2, our focus is on increasing creator productivity," stated Valve engineer Jay Stelly in a press release confirming the launch. "Given how important user generated content is becoming, Source 2 is designed not for just the professional developer, but enabling gamers themselves to participate in the creation and development of their favorite games." It's worth noting that Valve also plans to release a version of Source 2 that's compatible with Vulkan, the open-standard graphics API that's considered heir apparent to OpenGL."

+ - 102 Stealing Keys from PCs using a Radio 1

Submitted by Anonymous Coward
An anonymous reader writes "Cheap Electromagnetic Attacks on Windowed Exponentiation

http://www.cs.tau.ac.il/~trome...

"Overview

We demonstrate the extraction of secret decryption keys from laptop computers, by nonintrusively measuring electromagnetic emanations for a few seconds from a distance of 50 cm. The attack can be executed using cheap and readily-available equipment: a consumer-grade radio receiver or a Software Defined Radio USB dongle. The setup is compact and can operate untethered; it can be easily concealed, e.g., inside pita bread. Common laptops, and popular implementations of RSA and ElGamal encryptions, are vulnerable to this attack, including those that implement the decryption using modern exponentiation algorithms such as sliding-window, or even its side-channel resistant variant, fixed-window (m-ary) exponentiation.

We successfully extracted keys from laptops of various models running GnuPG (popular open source encryption software, implementing the OpenPGP standard), within a few seconds. The attack sends a few carefully-crafted ciphertexts, and when these are decrypted by the target computer, they trigger the occurrence of specially-structured values inside the decryption software. These special values cause observable fluctuations in the electromagnetic field surrounding the laptop, in a way that depends on the pattern of key bits (specifically, the key-bits window in the exponentiation routine). The secret key can be deduced from these fluctuations, through signal processing and cryptanalysis."

#########################################

Cryptology ePrint Archive: Report 2015/170

http://eprint.iacr.org/2015/17...

"Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation

Daniel Genkin and Lev Pachmanov and Itamar Pipman and Eran Tromer
Abstract: We present new side-channel attacks on RSA and ElGamal implementations that use the popular sliding-window or fixed-window (m-ary) modular exponentiation algorithms. The attacks can extract decryption keys using a very low measurement bandwidth (a frequency band of less than 100 kHz around a carrier under 2 MHz) even when attacking multi-GHz CPUs.

We demonstrate the attacks' feasibility by extracting keys from GnuPG, in a few seconds, using a nonintrusive measurement of electromagnetic emanations from laptop computers. The measurement equipment is cheap and compact, uses readily-available components (a Software Defined Radio USB dongle or a consumer-grade radio receiver), and can operate untethered while concealed, e.g., inside pita bread.

The attacks use a few non-adaptive chosen ciphertexts, crafted so that whenever the decryption routine encounters particular bit patterns in the secret key, intermediate values occur with a special structure that causes observable fluctuations in the electromagnetic field. Through suitable signal processing and cryptanalysis, the bit patterns and eventually the whole secret key are recovered.

Category / Keywords: side channel, electromagnetic analysis, RSA, ElGamal

Date: received 27 Feb 2015, last revised 3 Mar 2015

Contact author: tromer at cs tau ac il"

#########################################
EOF"

+ - 185 Ubisoft's newest video game requires a prescription->

Submitted by wired_parrot
wired_parrot (768394) writes "Ubisoft, in partnership with McGill university, has developed a game designed to treat lazy eye. The game works as a treatment by training both eyes using different levels of contrast of red and blue that the patient sees through stereoscopic glasses. It is hopeful that the new treatment will bring a more effective way of addressing a condition that affects 1-5% of the population."
Link to Original Source

+ - 231 French nuclear industry in turmoil as manufacturer buckles->

Submitted by mdsolar
mdsolar (1045926) writes "France's nuclear industry is in turmoil after the country's main reactor manufacturer, Areva, reported a loss for 2014 of 4.8 billion euros ($5.3 billion) — more than its entire market value.

The government of France, the world's most nuclear dependent country, has a 29% stake in Areva, which is among the biggest global nuclear technology companies. The loss puts its future — and that of France as a leader in nuclear technology — at risk.

Energy and Environment Minister Segolene Royal said Wednesday she asked Areva and utility giant Electricite de France to work together on finding solutions, amid reports of a possible merger or other link-up.

The government said in a statement that it's working closely with Areva to restructure and secure financing, and would "take its responsibility as a shareholder" in future decisions about its direction.

Areva reported Wednesday 1 billion euros in losses on three major nuclear projects in Finland and France, among other hits.

Areva has lost money for years, in part linked to delays on those projects and to a global pullback from nuclear energy since the 2011 Fukushima accident."

Link to Original Source

+ - 162 FCC Chairman Defends Net Neutrality At The Biggest Carrier Event

Submitted by dkatana
dkatana (2761029) writes "At the Mobile World Congress in Barcelona, Federal Communications Commission Chairman Tom Wheeler defended the recent FCC decision to support net neutrality by reclassifying Internet service providers under Title II of the Federal Communications Act.

According to Wheeler, the only “NO" for carriers under the new rules is no blocking, throttling or paid prioritization. The regulation has many more “NOs” for the agency, he said, listing bans on regulation of the internet, utility-style regulation, rate regulation, tariffing, network unbundling, regulation of technical operating requirements, new taxes or fees."