Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:I'm surprised (Score 3, Interesting) 14

Spam has shifted gears. Before, it was mainly advertising and "chop your dollar" scams. Now, I mainly see phishing attempts either to get people to give up data or to go to a site that would attempt a large number of exploits (even trying to offer bogus "securityscan.apk" files on Android.) This isn't surprising because getting a victim's computer on a botnet is far more lucrative for a spammer than actually getting them to buy some pills or fall for yet another 419 scam.

Comment Re:Not true (Score 1) 394

Watt/hours do add up. Fridges, water heaters, and HVAC systems do slurp up electricity, but don't run all the time. However, what can be a factor in the bill are devices that have 5-20 watts... but run 24/7.

For things like that, it may not hurt to drop in a small solar charging system to put those parasitic devices on their own circuit. It wouldn't be cheap (a couple thousand to do the job right [1]), but it would move all the parasitic devices (whose energy use does add up over time) off the mains power. As another benefit, those devices get very clean power [2], and would still function if the mains power goes off. How long until a system like this pays for itself? If mains power is dirty, it might pay for itself fairly quickly since power bricks and devices would need to be replaced less often.

[1]: Doing it right would mean a pure sine wave inverter, a set of decent AGM batteries, a MPPT charge controller and good panels. It also would mean having a charge controller that attaches to the mains power, so if the batteries get too low and the solar power isn't charging, the batteries still will get charged, keeping the appliances on that circuit still operable. The cost of all this is about the same as a true online UPS.

[2]: Assuming a good quality PSW inverter. A MSW inverter is cheap, but will barbecue components in no time.

Comment Re:huh (Score 1) 394

Refrigerators can be surprisingly thrifty. In fact, when RV-ing, a dorm fridge can be run from a battery bank, inverter, and a decent (250 watts) solar panel setup. Yes, the compressor does take energy... but it only runs a fraction of the time, so if it takes 350 W/h to run at a 100% duty cycle, it might only use 75-100 W/h realistically.

Electric water heaters are also decently efficient. They take a good chunk of energy to get the water to the set temperature... but once the water is heated, they tend not to use that much over time due to the decent insulation used.

Comment Re:And another on the ban pile (Score 1) 289

I'm surprised because Kingston so far has had an extremely good name, especially when it came to RAM. PNY wasn't up there, but at least from what I read, it was decent.

From /. articles and other reviews, I'm thinking if I go with a SSD, it will be Intel. Intel isn't perfect, but they seem to be tops when it comes to SSD reliability.

Comment Re:What a joke.. (Score 1) 186

I believe in the KISS principle. Even though people say that a hacker with the 0-days to go after IoT devices won't go after individual users... I will agree there. Individually, they won't bother with people. However, their script that walks the Internet and seizes control of devices, is what would be done, with that info being sold to another party, just like credit card dumps. In fact, a list of vulnerable/cracked devices a person owns might even be in the same database tuple as their name, social security number, and other item sold on the black market.

There are some things I don't need. I can look at the date of items in my fridge and tell they are going to expire. I don't need to have a fancy infrastructure in place so that some company can sell me milk in the next round of banner ads. I can look near the commode and tell how many rolls of TP that I have, and don't need to upload that info somewhere. I don't need a toilet which checks sugar levels, but quietly uploads that to health insurance companies so they have an excuse to raise premiums. If I'm worried about sugar levels, I can always get a meter and a roll of test strips and do the job right.

We do not need an IoT. We are being sold this shit because "market expansion" balloons stock prices even though it may or may not make revenue.

IoT devices will be engineered to be as cheap to produce as possible. They will be coming out of the cheapest factory in China, and engineered to barely work. At best, they will barely pass UL standards, if they don't just come with a fake UL tag in the first place. It will be a given that there will be little thought to security [1], and the only way to fix them will be replacing them with devices that are even buggier and more expensive.

If we want monitoring, the parent had one way to do it "right". I'd prefer a wired bus that is engineered the reverse of early USB. Devices can send info, but the top node that gets the info cannot initiate or send data... just send an ack that it got received. Even with this, there are still ways to hack it, so the ideal is no system at all.

Because it be connected to the Internet, doesn't mean it should. Take the Internet connected deadbolt. We don't need junk like that. Instead, the time it takes to engineer that should have been spent making a better locking mechanism/door/jamb system to help against actual threats like lock bumping and kick-ins.

[1]: I've heard "security has no ROI" many a time, coupled by "Infosys/Geek Squad can fix anything if we get hacked", when I ask the followup question about contingency plans.

Comment Re:Legacy file systems should be illegal (Score 1) 396

Microsoft has two technologies in Windows Server 2012: Storage Spaces (which is LVM level), and ReFS. Both when used together can detect bit rot, but IIRC, only when the Storage Space volume is set to mirroring, nor parity.

This is similar with ZFS. RAID-Z will detect bit rot, but won't fix it. RAID-1, RAID-Z2, and RAID-Z3 will detect and fix bit rot on a scrub. One can also use copies or ditto blocks.

Linux, there isn't much either way. I have no clue if LVM2 + btrfs will do anything about bit rot, assuming it has the ability to repair it from a mirror or a RAID 6 volume. This seems to be one of those "ask four people, get five answers" type of items.

If I were setting up a file server or backend RAID, I'd probably will go with Linux and ZFS (from the zfsonlinux projects.) The / and /boot filesystems wouldn't be able to be placed on ZFS, but almost everything else can. With a RAID-Z2 pool, this will go far in detecting and handling bit rot.

Comment Re:Yay, at last! Or? (Score 4, Informative) 90

I think it might have a niche utility, but to use a car example, this is like making a very top tier points/condensor/magneto system for a car's engine... while the world has moved on to common rail EFI.

I am glad it got released (I remember it being the dream of document presentation well before Mosaic appeared on the NeXT), but there are many other document utilities out there with similar function. PDF and HTML come to mind, perhaps nroff on a limited basis. However, the world has moved on. On the other hand, Xanadu deserves its place in history, just for the concept.

Comment Re:No point encrypting if you're the only one... (Score 1) 108

We sort of have that with OpenPGP encrypted files, and Web add-ons. However, it assumes one is going to load their private keys into the Web browser... and because the Web browser is the first thing that gets its face curb-stomped come a 0-day, this may not be a wise thing unless there is OS support for keeping the keys, decryption module, and decrypted text viewer/attachment manager well out of the browser's OS context.

The reason I suggest an old fashioned MUA is because they tend to not be as vulnerable to malformed E-mail messages when configured properly. The spammy E-mails either try to get someone to download a wrapped executable (.scr extensions are commonplace), or get the user to visit a bad site. The E-mail themselves tend to not by themselves be dangerous, assuming scripting is turned off by default.

Comment Re:Does it really matter? (Score 1) 248

Maybe only queries or certs that make sense as per laws, such as 13, 18, 21, 25, 65, etc. There wouldn't be a legal reason that a bar would need to know anything more than if they are legal, unless they were doing a retiree special (which the over 65 cert would cover.) The goal is to provide the minimal amount of info as needed for regulations.

Comment Re:Does it really matter? (Score 2) 248

I've wondered about an ID system with a smart chip, except based around a certificate and trust model. For example, Alice's ID would have a cert (each cert has a different life span [1]) showing that she is over 21, has a valid driver's license, is a US citizen, is not a felon.

At the bar, the card gets swiped, the cert shows she is over 21, so is allowed in. No birthdate needed.

When going for a loan, there is a cert showing her FICO score is above a threshold, her income is above a certain amount, and she is a US citizen. Just three pieces of info that are needed.

When going for a car purchase, there is a signature stating she has valid insurance, and a valid license. No more details are needed.

This would greatly improve privacy if done right.

[1]: The criminal record certs can have a short life, so someone who gets convicted either has the "not a felon" cert revoked, or it expires in a week's time.

Comment Re:Not really (Score 1) 228

ISIS is becoming a carrier standard for this. It uses NFC, a special SIM card with the ISIS application (so it can have its own PIN separate from the SIM's PIN/PIN2), and an Amex or Wells Fargo credit card.

Is ISIS a good thing? Possibly, but you have to open a new line of credit to use it, in most cases.

Of course, there is Google Wallet and PayPal as well, so there may be a standard war between those three companies.

I wouldn't say it would be the end of credit card fraud. It makes people more dependent on their phone, which means dire consequences if it is stolen, or if malware seizes control of the unit and is able to key-log the PIN.

Comment Re:Fixing a social problem with technical means? (Score 1) 108

Another issue is that some protocols are viewed negatively. Tor comes to mind, because it is anonymous and works well... but it becomes a source of abuse, and it is also associated with the Four Horsemen of the Infocalypse. If one could get mainstream users not just using Tor, but setting up usable exit nodes, it might change the perception.

Comment Re:No point encrypting if you're the only one... (Score 1) 108

Sometimes, I wonder about an encryption protocol implementation like iMessage being broken up into multiple companies, all separate, perhaps in different countries:

1: The company that codes the client.
2: The company with the servers where messages reside.
3: The company that writes the protocol.
4: The company that officially signs the executables to be distributed, but vets the code base for unauthorized changes before doing so.

By splitting this up, it would take compromise of at least two of the above, and definitely the company with the servers.

Slashdot Top Deals

Dynamically binding, you realize the magic. Statically binding, you see only the hierarchy.

Working...