Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security

Hackers Find Remote iPhone Crack 114

Al writes "Two researchers have found a way to run unauthorized code on an iPhone remotely. This is different than 'jailbreaking,' which requires physical access to the device. Normally applications have to be signed cryptographically by Apple in order to run. But Charles Miller of Independent Security Evaluators and Vincenzo Iozzo from the University of Milan found more than one instance in which Apple failed to prevent unauthorized data from executing. This means that a program can be loaded into memory as a non-executable block of data, after which the attacker can essentially flip a programmatic switch and make the data executable. The trick is significant, say Miller and Iozzo, because it provides a way to do something on a device after making use of a remote exploit. Details will be presented next month at the Black Hat Conference in Las Vegas." The attack was developed on version 2.0 of the iPhone software, and the researchers don't know if it will work when 3.0 is released.

Comment Re:How hard is it for a computer to do addition? (Score 1) 239

As stated by the GP, the "desire" for association is an auditing requirement and not really a personal request of the voter.

If you had access to the vote db such that you could take my unique identifier and associate it with my vote, would any kind of system be able to stop you from doing that? Your point has merit, but it is far from the current discussion.

Comment Re:How hard is it for a computer to do addition? (Score 1) 239

It's quite simple really.

Voting machine shows UI requesting the user's (voter's) vote. User chooses candidate. Voting machine registers an additional vote for user's candidate into the votes table. This vote is assigned a unique identifier. This identifier is printed onto a paper receipt which is provided to the voter. This can be later used to confirm that user's vote for candidate A was indeed registered for candidate A.

Just how hard is that?

Earth

Antarctic Ice Bridge Finally Breaks Off 505

GreennMann writes "An ice bridge linking a shelf of ice the size of Jamaica to two islands in Antarctica has snapped. Scientists say the collapse could mean the Wilkins Ice Shelf is on the brink of breaking away, and provides further evidence of rapid change in the region. Sited on the western side of the Antarctic Peninsula, the Wilkins shelf has been retreating since the 1990s. Researchers regarded the ice bridge as an important barrier, holding the remnant shelf structure in place. Its removal will allow ice to move more freely between Charcot and Latady islands, into the open ocean."

Comment Re:Please explain to me (Score 3, Informative) 345

It's OK to pull a gun on someone who is robbing your store only if local and state laws specifically say so.

Downloading and using software without a valid license is not covered by laws that allow the licensed distributor to do anything to other people's data.

Being other people's data, which the distributor or developer do not and cannot have any rights over, it is unlikely that any such law will be passed.

The Almighty Buck

Are Micro-Transactions the Future of Online Game Business Models? 68

Last week we discussed news of Sony Online Entertainment's unveiling of a store that would allow players to purchase in-game Everquest items for real money. Massively spoke with John Smedley, SOE's CEO, about the system and what their goals were. He made the point that they were limiting sales to things that wouldn't unbalance the game. "They're fun and they're convenient. That's all they are. We're not selling power. There are a lot of respectable viewpoints on this, and a lot of reasonable people can disagree on them. Our view is that nothing here is gamebreaking." Edge Magazine has a related piece about Mytheon, an upcoming action-strategy game that will rely on micro-transactions to support its otherwise free-to-play business model. The game's producer suggests that micro-transactions are "a model that really gets us closer to the end user, and that's the way things need to be in the future, online."
Security

The Backstory of the Kaminsky Bug 122

Ant recommends a Wired piece on the background story of the Kaminsky DNS bug and its (temporary) resolution, decreasing the odds of a successful breach from 1 in 2^16 to 1 in 2^32. We've discussed this uber-hole a number of times. Wired follows the story arc from before Kaminsky's discovery of the bug to his public presentation of it in Las Vegas.

Slashdot Top Deals

"And remember: Evil will always prevail, because Good is dumb." -- Spaceballs

Working...