Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:Thank god for Apple... (Score 1) 53

They are still using, AFIAK, with the latest gen iPhones, as they mentioned "ion strengthened" glass, which is what Corning's product is.

I think the iWatch will be the first product with the sapphire glass research, since it is better with smaller screens. Plus, there is a difference between scratch resistance and shatter resistance. A watch can use a lot more scratch resistance than shatter resistance, so a harder, more brittle glass like sapphire glass would be more useful as opposed to something a bit less hard, but more resilient (less shatter prone) that would be needed on phones and tablets.

Comment Re:Part of the defamed "e-waste" culture (Score 1) 53

AFIAK, it is more like "tribute", like an Elvis tribute band.

The ironic thing is that tinkerers are the people that started the computer industry. If it were not for MIT's model railroad club and hobbyists from the two Jobs to Linus and Jolitz making basic operating systems, the world would look completely different. (Most likely we would be using Compuserve like forums with TV set top boxes for "internet" access, paying by the kilobyte, more if we actually stepped up to a 2400 bps modem.)

Because of this disposable mentality, the aspect of tinkering has all but vanished from the American psyche. The "cool" teenager who manages to modify the carb to shave a few milliseconds from his 0-60 score has been replaced by someone using Instagram to take a photo of their food before uploading to FB. Maybe the tinkering mentality might come back.

All and all, the tinkering mentality is what made the US what it was. If/when China gets the free-thinking, inventive mentality that has been a hallmark of the West, there is no stopping them, whatsoever. It also is a shame that it is lost, because the questioning, tinkering mentality separates people from drones.

Comment Re:Repair (Score 2) 53

I don't like having to re-buy goods due to planned obsolesce. Take TVs, for example. I have a Sears TV in storage from the '80s. The manual has circuit schematics, where to get replacements for the channel buttons, how to replace switches, what pots are used where. It was made so someone with basic soldering skills could at least maintain it. A new LED TV just gets chucked and you buy a new one, even though the problem could be a membrane contact that costs a penny.

The economy is getting shittier in general. In the past, we could afford to replace things when something small broke. I had a collegue who bought a new car every 2-3 years, once when the relay controlling the heated seat failed. These days, it is commonplace to see people nursing their old Saturns and Honda Civics to keep them on the roads. That is why headlight polishing kits are so common. In the past, vehicles got replaced before the glass or Lexan dulled (or used sealed beam headlights.)

One reason why companies have chosen to go with products that cannot be repaired is simple -- it gets rid of the used market. In the past, if someone had a broken lawn mower, someone else could give it a carb rebuild and get it perfectly functional. A lot of goods, once broken, can't be recycled, much less salvaged for anything whatsoever, which means no real secondhand market.

This is going to backfire. Will a company make more money in the long run if they sell parts to fix their gizmos, or more gizmos in a good economy, and almost none when the economy goes bad and stays bad? For long term thinking, having repairable items brings in a long tail due to the parts sales.

Comment Re:Expert. (Score 1) 358

We already have this tech already. Pixelmags does exactly this with magazines in their DRM-ed format. Adobe Flash can do this as well, and has been doing so since the VideoWorks days.

So, I'm guessing Apple is going to be making something similar to a password-protected HyperCard stack I made in 1989 that had the menubar hidden, with a special extension to tell what tracks/sectors the file takes up and automatically exit if the file resides somewhere different?

Comment Re:Good (Score 1) 126

Encryption transforms are computationally cheap. A MC68000 could do DES-48 with FDE [1] without a noticeable slowdown, so an ARM chip which is several decades ahead would have zero problems with the array shifting of AES.

[1]: As per a program called Access Managed Environment by Casady & Greene, which would DES encrypt the entire hard disk. It was arguably the most thorough encryption program I've seen, offering encryption for removable media, folders, files, even tape, with various methods of recovery (master password, floppy disk, etc.)

Comment Re:"unlike competitors" ??? (Score 4, Informative) 504

On Android, you can use dm-crypt to encrypt your /data partition with a passphrase of a real length, which is separate from your screen unlock PIN/password.

You do need to root it, and type in a command similar to this:

vdc cryptfs changepw newpass

or to enable encryption via the command line:

vdc cryptfs enablecrypto inplace

With /data encrypted, it will prompt for the long passphrase at boot, then from there on, just need the short screen locker password.

I like this part of Android -- you can easily pack your own parachute when it comes to encryption.

Comment Re:So everything is protected by a 4 digit passcod (Score 1) 504

One can easily set a longer passcode. Just tell it to do longer than four digits, use numbers only in the password, and once set, the iDevice will prompt you with a numeric keypad and an OK button. If you use letters in your password, it will use the usual full alphanumeric setup.

This way, one can have a longer PIN (I prefer at least 12-16 characters.) Not one in 10,000 anymore, but far higher.

Of course, the attacks will then go to the rubber hose decryption (xkcd.com/538), but it does raise the bar.

Comment Re:Garbage Disposal (Score 1) 165

Treating them as their own "special" category of evil people only strengthens their cause. If they are just another convict up for murder in max lockup in either a civilian prison or Leavenworth, all their "magic" is gone, compared to being stashed in a special offshore prison, called a "terrorist", and not given a trial.

Who will get more recruits. Someone on Lockup showing their gang signs, or someone stashed in a special prison because they are "terrorists". Lets be real here. The murderers locked in max in most places are just as dangerous as "terrorists" if not more, so why give them special treatment? In fact, let the general prison population decide their rank in their society.

As for the death penalty, I used to be for it, but it brings we who live in the USA down to their level. We need to take a page from Europe and Israel, lock them up for life. Killing them only makes them martyrs.

Comment Hopefully not like their TV remotes... (Score 5, Informative) 115

I hope their home offering isn't like the TV remotes, where to get it to work, I had to create an account with them (with demands for a lot of personal info), go through their relatively awkward website to find the televisionI was using, have that downloaded to the device via USB, and then add some configuring after that before the remote could be used as a remote.

Heck with that. If a remote can't offer an interface to locate stuff on the device itself, it should at least not require an Internet connection (the application should handle this, perhaps downloading codes for newer items), and definitely not require registration on a website to be used.

Comment Re:Yes, pipelined utilities, like the logs (Score 3, Insightful) 385

That is a valid complaint. Adding functionality so startup is parallel is one thing. Having one's own binary log format [1] is a big downside. To boot, rsyslog uses cryptographically signed logs. That means that I lose protection on systemd's logs because in theory an attacker could tamper with those. Should the logs go to rsyslog, the files either will show tampering or be missing.

This also prevents logging to a remote machine as well.

I'm not a fan of binary logs. Even AIX will log stuff from the errpt command if you turn on the right syslog settings. Binary logs make a program like Splunk a necessity, and that is not a cheap tool once you start talking about gigs a day hitting your index servers.

[1]: I don't like the "pro" for it saying that journalctl can give you just the info that you need. For the info I need, I have grep, egrep, and many other tools.

Comment Re:Simple set of pipelined utilties! (Score 2) 385

Religious sentiments aside, systemd scratches a number of itches that eventually needed to be addressed. The main one is parallel startup of daemons. On a SSD based machine (and note, these are anecdotal runs), CentOS 6.5 takes about a minute to fully boot to a login prompt. On CentOS 7.0 with systemd starting anything that isn't relying on another process at the same time, well under ten seconds. Similar with a shutdown.

The second item is being able to place processes in containers and set limits before they start. This can be done with SVR4 startup with wrapper scripts, but systemd makes it easier.

The main thing I see against systemd is that it is new. I remember pushback in the early 1990s when Linux distros went to the SVR4 way of starting up from having everything in a big /etc/rc file with branches to other /etc/rc.whatever files, and finally a rc.local file.

The second downside is that systemd has more moving parts. However, it will only be a matter of time before the bugs get eradicated. Heck, sendmail used to be the hair-puller for sysadmins and even that beast is now a long since solved problem.

If one wants to gripe about something, gripe about firewallD. For bringing Windows type abstraction to Linux, it is great. Anything else, it is just another questionable layer that is of dubious value at best, a potential vulnerability at worst.

Comment Re:Not Hacked? (Score 1) 191

In reality, the next step up on Internet services is moving to 2FA everywhere. Passwords are easily gotten, but 2FA, though doable, raises the barrier immensely. It means that someone would have to know the user's password and have control of one of their devices. This is far harder than just sifting through a pile of passwords found on a bittorrent dump and trying them on various accounts, or guessing a user's grandma's last name.

I'm sure that if the users that had the pictured compromised had their phones secure and had 2FA on, we wouldn't be inundated about these stories.

Of course, 2FA isn't a perfect solution. Lose access to one's phone number that is used for texting codes, and lose access to the recovery key... and one is hosed big time, be it if they are on Google, Dropbox, Apple, even Yahoo. The ideal would be a vendor neutral keyfob that can be used with everyone's 2FA systems, either as the main means of authentication, or as a tool for recovery, where the keyfob can be stashed somewhere physically secure if there is no other way into an account.

Comment Re:$100 (Score 4, Informative) 50

There is a point where phones are "good enough". If it can run basic apps (usual popular ones, and a large game or two), for a lot of people, why buy something else?

For example, my HTC One X Plus and my HTC One M8 both have NFC, decent CPUs. The biggest difference is the M8 has a MicroSD card slot that can go up to 128 gigs, but if I had to go back to the HOX, it is doable.

The mobile industry is running into the same issue that the PC industry has about a decade ago -- what is out is good enough for most tasks, so why bother running the upgrade treadmill?

A $100 phone would still be a decent unit. Not with all the bells and whistles, but still fine for daily use by a lot of people.

Comment Re:A solution in search of a problem... (Score 1) 326

There is one tool I've found that has come in handy: A dash cam. If we get more people using these, some texter denying their actions would be proven wrong (assuming the camera has a good shot and the footage is detailed enough) in both civil and criminal courts.

Put the fear of $DEITY into people that if they cause a wreck... someone has a dash cam of the situation and will be more than happy to put that video on YouTube for a DA, opposing lawyers, insurance company, and cow-orkers to see, it might just stop a behavior when no amount of laws or nanny tech inventions would.

One thing though: I wish there were a company that made GOOD dash cams. GoPros are great general cameras, but something that can be mounted under the rearview mirror, hold about 8 hours of high-res footage, and perhaps even offer some facility for detecting tampering.

Comment Re:That almost smells like... (Score 1) 85

That is the only reason why last year I went to the 5S. I was thinking Apple would let apps use it as an authentication tool.

That way, I could have an app that groks OpenPGP packets, and can allow the private key to be unlocked at the start of the session, while the fingerprint is used to validate that a request for signing/decrypting with the key is one that has some authorization with it. Since the passphrase is cached, the weakened security during that session isn't that great, and it would stop someone who grabbed the phone from being able to do subsequent signatures/decryptions with the stored keys.

It would also be useful for apps like PayPal which could require a fingerprint scan to confirm a payment or other financial transaction. An attacker who grabs the phone would be hard-pressed be able to dump PayPal's RAM structure out to grab keys, so it would be "good enough" to keep a phone that didn't lock its screen from being a juicy target.

I was wrong on those counts, although the fingerprint scanner is a nice shortcut, so I can access the phone without someone shoulder-surfing my PIN.

Slashdot Top Deals

"When it comes to humility, I'm the greatest." -- Bullwinkle Moose

Working...