Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Submission + - The Dilbert ICO: Scott Adams' crypto offering analysed (davidgerard.co.uk) 2

An anonymous reader writes: Scott Adams, author of Dilbert, ran cartoons a couple of weeks ago about "blockchain." We now know why: he's put up an ICO, the "WhenHub SAFT". David Gerard, author of Attack of the 50 Foot Blockchain, analyses what's actually on offer here. Summary: questionable business plan — Fiverr but paying tokens instead of money — but the ICO itself looks legally solid, which is unusual for the space.

Comment Re:A joke? (Score 1) 647

Pottering doesn't work for MSFT, he works for the 3 letter agencies. Considering that MSFT would probably be a step up on the trust scale. Where does Pottering get his money? Red Hat...okay so where does RH get THEIR money? NSA,DoD, FBI,CIA, DoJ, something like 85% of their income is from .Gov institutions, most in the Intelligence community.

[citation needed]

Comment Not what the app wants -- what Google makes it ask (Score 1) 234

The trouble is Android's permission model is crap. If an app has a feature that requires a permission the app may need at any point in the future, it has to be approved by the user at install time, and the app cannot control how the permissions are described or even explain to the user why it needs that permission. And lots of innocuous permissions are bundled up together non-granularly with scary dangerous (or dangerous-sounding) ones, so the app only needs EraseBunnyDrawing permissions but to get that it has to request KillFamily permissions, which doesn't actually mean kill *your* family, it means kill a process family, but all the user sees is "Permission to kill family members without warning" and OH GOD WHY DOES AN APP ABOUT DRAWING FLUFFY BUNNIES REQUIRE MY FAMILY TO DIE?! THIS APP SUCKS!!!!!!1111!!!!!oneoneonetyone1!!!

And then the story hits TechCrunch, where it's summarized so that it sounds like there have been actual deaths of family members, and then the mainstream press and the Today show start calling the app developer asking "Why are you a horrible person whose app killed little Stacey's favorite uncle?? :( :( :("

And all because Google can't get security UI right.

Comment Re:Explanation of Uber permissions... (Score 1) 234

Read Google service configuration.
Modify system settings.
Full network access.

I've bolded the last three because there's no reason for them.

Sure there is. If Uber is doing anything that can't (or for some reason they they don't want to) be handled over HTTP, the app will need full network access. (I don't know what the Uber app uses it for, but apparently WhatsApp uses it for IM communications with other app users.) "Modify system settings" is apparently (per the linked explanation from WhatsApp) the only way to get permission to read system settings. "Read Google service configuration" (again, per previous link) is used for interacting with Google services like Maps, which you can easily imagine why Uber's app would want to do.

Comment Re:Explanation of Uber permissions... (Score 2) 234

The researcher found Uber was SENDING ALL OF THIS BACK TO UBER'S SERVERS.

Sorry for yelling, but it's an important point.

NO HE DID NOT.

Sorry for yelling, but it's an important point.

Go back and read the original GironSec blog post where he even acknowledges explicitly what he (inexcusably, IMHO) failed to do -- that others did after him and surprise! found nothing especially amiss -- before he wrote an inflammatory blog post based on supposition, conjecture and ignorance of context.

Submission + - This Keynote Speech Brought to You By...

Old Man Kensey writes: In a world where everything from field goals to the year 2000 has a corporate sponsor, could scientific conferences be far behind? Pharma blogger Derek Lowe reports that a conference he's at started off with a video ad for Thermo Scientific just before the keynote. I've seen this at IT-industry conferences organized by vendors, but it's apparently new to Lowe.

Comment Maybe Scott Lowe is the main target (Score 1) 536

This just doesn't pass the sniff test, because right after the guy calls Scott Lowe out by name, he signs off as:

> Gregory Perry
> Chief Executive Officer
> GoVirtual Education
>
> "VMware Training Products & Services"

So I'm seeing a chain of thought like this:

"I'm a bit player in the VMware training market. I need to get my name out there somehow if I want to expand. Maybe if I can make somebody big like Scott Lowe look like an idiot... Hmmm, he's been pushing OpenBSD lately, and I bet Theo still remembers me. Maybe if I concoct a story that Lowe is complicit in some kind of subversion of OpenBSD, Theo will want to get to the bottom of it so he'll tell people about it -- and then no matter what, people will just remember that Lowe was rumored to be doing something shady."

Also, as another poster noted, government NDAs regarding something like this (which would be considered classified info) never "expire" (until the info is declassified, and then only to that extent). So this guy is either lying, or violating federal law, by making this claim. He doesn't even know that EOUSA is a parallel division of Justice, not "the parent of the FBI", so my bet is on "lying".

Comment Re:Already happened in Virginia (Score 1) 374

The IRS could have built their own website 15 years ago if they wanted, but one feels that they've gotten so cozy with HR Block, Turbotax, Legions of CPAs, etc... that they didn't want to rock the boat.

Actually, back inthe day, the IRS wanted to do exactly that, but the entire tax industry screamed "unfair competition" and threatened to sue. Ultimately the IRS agreed to not do its own tax software, but only if the industry collectively would provide free online filing to a certain increasing percentage of Americans each year.

Slashdot Top Deals

8 Catfish = 1 Octo-puss

Working...