Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Bad Analogy (Score 1) 716

What is a spectacular crash in software? ... Software just doesn't fail that catastrophically

Wut.

Oh yes it does. If you don't realise that Internet security is already a catastrophe then I just don't... you really really need to get out more.

We're living through the biggest security and privacy disaster in the Internet's short history. We don't yet understand the full dimensions of the damage, but we understand this: it was almost entirely preventable. Inexcusably shoddy software workmanship, defended with exactly the argument you're making, is what caused this.

We won't progress as an industry until we learn the meaning of "first do no harm". First, deploy no root exploits to your customers. Then we can talk about efficiency, productivity, market forces, and what colour the fifth pixel from the left on the splash screen should be.

Comment Re:Am I the only one.. (Score 1) 158

Hell, back in the 80's it was common for kids under 10 to teach themselves how to program.

Yes, exactly. I was there, I was that age. I remember how it was.

Of course, the ROM-based 8-bit micros we bashed out 10 PRINT "INSERT NAME HERE RULES": GOTO 10 on weren't nearly as scary as a toxic HTML5/Javascript/PHP/MySQL soup of SQL injections and root vulnerabilities running on a three-tier Web platform. It was our parents who were scared of "breaking the computer" while we reassured them that no, a misplaced comma wasn't going to drain their bank account and launch the NATO missile arsenal, and a 'crash' just meant we had to hit the power switch. And we mostly just coded BASIC so we could get games running. But it was fun, and we learned a *lot* more than you do with Facebook and a Playstation.

Things are a lot different now. I wish we did have coding environments half as safe and clean as a Commodore 64 or Atari 800. In fact, growing up in the 80s taught me a lot I had to unlearn when the Internet came along; for years it never occurred to me that commercial software could be so fault-riddled and plain dangerous to operate as Windows was. After all, I'd used machines with 8,192 *bytes* of RAM that were solid, stable, and just didn't crash unless you physically tripped over the power button. Your machine was totally air-gapped, totally safe, and could be reset to factory defaults instantly. And that was an environment where you could try anything and learn. It was intoxicating, ike having wings under your brain.

But now... no, now we've built the Matrix we had nightmares about in the 1980s. Not the space-opera Wachowski Matrix; the Gibson Matrix, all neon and chrome and happy smiling avatars on the outside, and a horror show of broken crypto and corporate greed inside. And hacking has become as stupidly easy as downloading a rootkit and clicking 'go'. And there's no guarantee that your hard drive controller or your building HVAC server aren't under the control of the NSA or the Mafia.

Good luck, guys.

Comment Re:How long would that last... (Score 1) 353

If you actually didn't know what you were doing and they tasked you to accomplish something?

Then presumably you could get a good job as a security reviewer for Adobe or Oracle.

"Exploit, exploit, exploit, exploit, Flash, Java, exploit and exploit. That's not got much exploits in it."

Comment Re:DOOOOOOOMED (Score 4, Insightful) 222

the systematic "burning" of Cold War nuclear weapons as commercial fuel to light the very cities they once threatened.

Admittedly WWIII would also have lit the cities extremely well... for a couple of microseconds.

I think the generation who grew up after the 1980s don't really grasp just how intensely we 80s kids felt the shadow of nuclear war. You can't really understand 80s culture without that; it seeps into almost every part of art and culture from 1980-1989, especially New Wave music. Climate change and the War on Terror combined? They don't even begin to approach a fraction of the existential certainty of absolute destruction we felt. (Though we had both back then too; watch 1973's "Soylent Green" and you'll see global warming as part of the backdrop). And the relief at WWIII being postponed when the Wall fell... quickly turning to disgust as capitalism ate everything...

"I wanted to run through the street yelling, to grab them all and say: 'Every day from this day on is a gift. Use it well!' Instead, I got drunk."

That right there is everything you need to know about Generation X and why we feel so burned out on life. But, hey, alive after twenty, and not expecting to be, and every day we don't have a nuclear apocalypse is a good day. And every nuclear warhead destroyed and turned into toxic but not explosive nuclear fuel is a win.

But the nukes are still there, and the missiles are being repurposed as 'conventional' warheads, and that's sure going to end well for all concerned. Before, identifying nuclear attack was easy: an unscheduled ICBM launch means you push the button. Under Prompt Global Strike, how do you tell if an incoming ICBM signature is a nuke warhead or a conventional warhead? You don't. You guess. That's.... nice.

So, the Doomsday clock is still relevant and I for one am glad it's there. To remind us all of what once was, the shadow we lived under, and the shadow that still hasn't completely gone away.

Comment Re:Wearable Tech (Score 1) 134

I think the most compelling part of Google Glass is the first-person recording.

Isn't that also the part which everyone else considers an unacceptable privacy intrusion? Someone coming up to you wearing Glass might as well be holding a sign saying "hi, I'm going to record this conversation without your permission and post hilarious videos of you on social media! Do you want to 1) run away, 2) put on your Oculus Rift as a privacy shield, or 3) skip the preliminaries and punch me right now?"

Comment Re:9.1 (Score 1) 1009

Do you find the libraries weird?

No, I find the libraries break the filesystem model entirely. They are folder-like entities which aren't folders if you browse via cmd or Powershell, don't have paths associated, can't be enumerated via the standard API, but 'exist' in some half-defined sense only for Explorer.

How do you script writing a file into a library? How do you script renaming a library? How do you configure a corporate application so it installs into a library? How do you write a script to backup your files out of a library when it doesn't even have nameable path? When you write a file to a library, how do you find where it really wrote to? How do you identify where a file you read out of a library is really coming from?

Now, if they'd added the underlying Library concepts (a folder which is a union of multiple read-only and read-write source folders) into the filesystem, at the appropriate level, then I would have been cautiously supportive. It would probably still be a breaking change, but would break far less and integrate into the system automation level well. But as it is...

Comment Re:These issues have been flagged for 10 years (Score 2) 195

When a lot of these systems were placed in the open, the entire thought of exploiting them was pretty much non existent.

Only "non-existent" to people who weren't thinking and weren't paying attention to the literature. There had been a LOT of academic warnings back to the 1970s about the potential security problems of interconnected networks. Heck, the entire genre of cyberpunk science fiction in the 1980s - Neuromancer was 1984 - didn't come out of thin are but was based around the then-current academic discussions of the security problems of the early Internet. The first IBM PC virus was 1986, the Morris Worm was 1988, pretty late in the game.

Yes, it wasn't headline gossip-reality-show news like it is today - but industrial control designers? In the 1990s? Nope, there's no excuse. They were definitely in a position to know, should they have bothered to care.

Comment Re:A promise only goes so far (Score 1) 351

Ideally, miners should be responsible and move to another pool to avoid the 51% attack possibility.

Ah, so exactly like how large corporations don't ever try to destroy their competitors, industries never injure the environment, financial bubbles don't form, and organised crime simply doesn't exist, Bitcoin miners can always be counted on to altruistically pass up an opportunity for massive temporary personal gain in order to enrich the wider community?

I like this principled Libertarian machine you've built here.

Comment Re:Skynet (Score 3, Funny) 514

A robot, conversely, would always do what its master tells it, regardless of whether the master says, "go pick some daisies," or "go commit genocide."

ORDER RECEIVED: Pick daisies.
TARGET LOCATED: Daisy lawn, municipal park.
WEAPON SELECTED: BLU-82B ammonium nitrate/aluminium tactical thermobaric device "Daisy cutter"
EVALUATION: Commander will be so pleased.

Slashdot Top Deals

After a number of decimal places, nobody gives a damn.

Working...