Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Submission + - Uber gave data on 12 million people to U.S. law enforcement

An anonymous reader writes: The story title comes straight from Mashable, which reports that Uber, in its first transparency report, "provided data on more than 12 million drivers and passengers to U.S. law enforcement in the second half of 2015". You'd think that there must have been hundreds of thousands if not millions of data requests from the government? Nope. Not hundreds of thousands. Not thousands. Not even hundreds. 33.

Comment Re:Android? (Score 4, Informative) 405

I think it depends on the OEM. There are factors such as whether the device storage is encrypted by default, whether the bootloader is locked by default, what kind of security hardware is available on the SoC and whether it is used, whether exploits are patched, whether there is a continuing roll out for discovered exploits, whether updates are automatically installed w/o authentication, whether the baseband contains known exploits and attack vectors (cough), etc.

So there's no one answer because there's no one Android device and many phone OEMs (and the manufacturers of the underlying hardware platform) may be implementing security to different degrees. Though many of these considerations do have google guidelines and policies in place, some of which may be enforceable via google compatibility tests, there is a wide spectrum of what you can expect from Android generally speaking I think.

You might look to Google's policies and recommendations, and more importantly their Nexus devices themselves as models for what they consider best practices to be. Then there is blackphone and other distros that have security as their primary focus, so they may be good to consider as well.

Submission + - T-Mobile CEO: "Who the fuck are you anyway, EFF?"

An anonymous reader writes: After T-Mobile's opt-out "Binge On" was revealed as across-the-board throttling of all video downloads, the CEO of T-Mobile, John Legere, held a Twitter Q&A to calm the outrage and to redefine "throttling" so he could deny doing it. In answering a question from the EFF, he added "who the fuck are you anyway, EFF"? Things went downhill from there and partners are now at least one video company is dropping out of Binge On (but is still getting throttled)

Comment Well, if it weren't for snowden... (Score 5, Insightful) 204

The logic of authoritarians:

Thanks to Snowden's revelations, terrorists started using unbreakable encryption!!!!!!!

Right. Except they didn't.

That was pre-Snowden. Terrorists didn't know about encryption before that.

Right again. Except they did.

So, you see-- Snowden has "blood on his hands" for making terrorists aware of encryption, which they knew about for decades, so they could use it, which they didn't. And thank goodness for that, because if they had used encryption, the attacks might have been successful, which they were.

Got it.

Comment Re:Let me get this right.... (Score 5, Informative) 372

This sounds like the comments of someone obviously blind to the realities of stepping into a hostile crowd alone.

Yes, there is an escalating war against the police. In fact, with one shooting per week in 2015, it is a very dangerous time to be a.. toddler? (checks link) Wow.

In America, more preschoolers are shot dead each year (82 in 2013) than police officers are in the line of duty (27 in 2013), according to figures from the Centers for Disease Control and Prevention and the FBI.

                        --- sketchy source

Well, c'mon, that was back in 2013, before the "Ferguson Effect." What are the more recent statistics--oh...

2015 may be one of the safest years for law enforcement in a quarter century.

So how are these "realities" you speak of any different now than before the new "video scrutiny"?

Comment You can see the long-term picture. (Score 2) 177

It happens like this:

(1) Companies write TPP and other laws to indemnify themselves and resist modifications to their buggy routers.

(2) FCC makes the problem worse by effectively requiring DRM on routers.

(3) incidence of serious hacks skyrockets as people are unable to update their routers and other network-enabled devices.

(4) legislators react to spike in online crime/tragedies not by undoing (1)-(3) but with "get tough" anti-"hacking" laws that chill research and throw people in jail for minor transgressions, research, clock-building, vulnerability disclosure, security tools, or a anything not understood that politicians and aggressive prosecutors could perceive as "hacking".

(5) The problem gets MUCH MUCH worse as a result. Bright minds are tossed into jail, open research is chilled, and online crime continues to skyrocket.

(6) GOTO 4.

Submission + - Hot new WIFI microcontroller module under $5 Arduino programmable (esp8266.com) 5

An anonymous reader writes: Vibrant maker community rallies around this new Internet of Things chip and builds a huge collection of resources on esp8266.com the official Community Forum for this IC.

Specifications:
32 bit Xtensa architecture processor
12 I/O pins
modules from 512KB to 4096KB
WIFI b/g/n
Arduino IDE support

What I find truly amazing is when I search SLASHDOT I come up with zero ESP8266 results.... how was this missed???

Submission + - Not in my ZIPCODE: Fracking increases hospital visits (plos.org)

Michael Tiemann writes: An article published in PLOS One finds increased hospital admissions significantly correlated to living in the same ZIP CODE as active fracking sites. The data comes from three counties in Pennsylvania, whose ZIP CODEs mostly had no fracking sites in 2007 and transitioned to a majority of ZIP CODEs with at least one fracking site. While the statistical and medical data are compelling, and speak to a significant correlation, the graphical and informational figures flunk every Tufte test, which is unfortunate. Nevertheless, with open data and Creative Commons licensing, the paper could be rewritten to provide a more compelling explanation about the dangers of fracking to people who live within its vicinity, and perhaps motivate more stringent regulations to protect them from both immediate and long-term harm.
Programming

Rust 1.0 Released 149

TopSpin writes: Rust 1.0 has arrived, and release parties in Paris, LA and San Francisco are taking place today. From the Rust Programming Language blog: "The current Rust language is the result of a lot of iteration and experimentation. The process has worked out well for us: Rust today is both simpler and more powerful than we originally thought would be possible. But all that experimentation also made it difficult to maintain projects written in Rust, since the language and standard library were constantly changing. The 1.0 release marks the end of that churn. This release is the official beginning of our commitment to stability, and as such it offers a firm foundation for building applications and libraries. From this point forward, breaking changes are largely out of scope (some minor caveats apply, such as compiler bugs)." You can read about specific changes in the changelog.

Comment I don't think so... (Score 2) 59

...except my cable modem does not share storage with my PC. On the other hand, the baseband and Android system (not to mention the device-specific efs/imei stuff and the user data stuff) are all located on the same emmc on many devices. (Hence the ability to "flash a new radio")

Could the baseband access or change data on the Android partitions or the efs data? I'm not sure, but the articles suggest to me that they could.

Also, my cable modem doesn't share memory with my PC either: ....the application processor (with Android e.g.) and the baseband processor can share memory, so that an attack and takeover of the baseband stack offers the possibility to attack Android.

The baseband may have a separate CPU from Android, but it could access peripherals, sensors, etc. As an example:

The baseband processor (and thus REX OS) has direct access to the phoneâ(TM)s hardware (speakers, microphones), and also seemingly the ability to write to the same memory as the SoC (or application processor).

That's bad.

Also, unlike your cable modem analogy, which communicates to your router via a known network protocol, the baseband communicates with Android in most cases via the involvement of closed-source, mysterious "binary blobs".

So I guess if your cable modem were fused to your computer, sharing a hard drive, with direct access to its memory and peripherals, and communicating to your computer via a mysterious unauditable binary, then maybe your analogy would hold up.

Comment Re:Let me guess (Score 2, Interesting) 59

I know this is the second, uh, let's-just-say-"story" about Blackphone in four days, but I think it should be noted that the stolen Gemalto keys may have included "OTA keys" that can be used for over-the-air SIM card upgrades:

Access to these encryption keys do not give governmental agencies only the power to monitor cellular communications, including calls and data, but they also come with additional perks, such as the power of instructing a device to install specific programs.

Spyware could be installed on the SIM card itself, and then it could be used to install additional spy apps on a phone without the user's knowledge, or to retrieve data from it.

From the Verge story:

Manufacturers can send a binary text message directly to the SIM card, and as long as it's signed with the proper OTA key, the card will install the attached software without question. If those keys were compromised, it would give an attacker carte blanche to install all manner of spyware.

So apparently it does matter.

Comment Lawrence Kasdan gets only a quick mention? (Score 3, Insightful) 422

I don't understand. A hundred comments and you're the only one I see who even mentions, let's alone puts due faith in co-writer Lawrence Kasdan.

Kasdan co-wrote "The Empire Strikes Back", co-wrote a movie called "Raiders of the Lost Ark", and wrote other, ehem, minor movies like "The Big Chill", and "The Bodyguard" and "Silverado".

He's co-writing this thing.

Slashdot Top Deals

An authority is a person who can tell you more about something than you really care to know.

Working...