Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Open source win (Score 1) 306

Unfortunately, you can boil the entirety of information theory to 'security through obscurity'. Airplay uses public key encryption and is in that sense 'secure'. Everything that needs to read the encrypted content (in this case the airplay device) needs to have the key to decrypt it. Thus you can argue that the whole system is 'security through obscurity' because it is relying on the 'obscurity' of the private key that the end-user can't get access to (unless the pry it open with a butterknife and dump the ROM).

Yes, you can boil it down to that, but in doing so you ignore the meaning of "security through obscurity" and replace it with a definition so broad that it loses any meaning. Name a system you consider secure that does not rely on "security through obscurity" by your definition.

See http://en.wikipedia.org/wiki/Security_through_obscurity and http://en.wikipedia.org/wiki/Security_by_design

Comment Re:Somebody call the waaaambulance (Score 1) 1018

These programs have no idea as to when to buy, sell or hold. All they do is retrieve data and analyze it into reports. It's up to the trader to know what to do with it.

That's exactly what they DON'T do. These programs buy and sell on their own, without any help from a human trader. It would hardly be high frequency trading if every trade had to be vetted by a human first.

Comment Re:Let's get this right. (Score 1) 260

Apple's competitors could conceivably use their Analytics groups for industrial espionage

In that case, Apple is still acting to protect itself from its competitors. Its purpose is not to protect its customers from spyware as you suggest.

Yes, and anyone can be a spy. But we still give people security clearances.

Being a spy is illegal. Apple isn't saying it's "illegal" to install spyware; they're saying it's "illegal" to be a competitor and install spyware.

Furthermore, Apple can easily prevent any risk of industrial espionage by using a firewall when necessary. The risk of espionage is a bullshit excuse Apple hides behind. Apple must understand security this basic if they're selling operating systems (or one would hope).

Comment Re:Let's get this right. (Score 1) 260

Apple's move was not a move to give iAd an advantage. It was a move to try to keep analytics from being spyware.

The reality distortion field is strong with this one. You think Google has a monopoly on spyware?

If this were about spyware then no one would be allowed to collect analytics. This isn't the case, however, so it isn't about spyware. It's about limiting Apple's competitors.

Comment Re:What to do (Score 1) 572

If you want any certainty, every free project is in need of auditing by the end user.

Nowhere did I argue that open source software is just as likely to have backdoors. It is, however, possible and ultimately your security still comes down to some 3rd party (my original point). Your argument seems to boil down to "software not audited by a trusted party is dangerous," but what you're saying is "proprietary software is dangerous." The two are not equivalent: there exist free projects which haven't been audited properly and proprietary projects that have. Calling lack of backdoors an inherent advantage of OSS creates a false sense of security and simply isn't true. At best being well-audited is an advantage of large and popular OSS projects, but even then it doesn't universally apply (e.g. OpenOffice) and there's no easy way to tell where it does.

(There is also the issue of accidentally introducing vulnerabilities, which your "many eyes" and "shame" factors don't necessarily preclude as evidenced by the Debian OpenSSL bug. Your original "proprietary software is dangerous" argument ignored this possibility.)

Comment Re:What to do (Score 1) 572

The DRM is not even the only issue. If you run anything that is binary and closed-sourced on your GNU/Linux machine, with your user privileges, you are basically asking for a punch in the gut. Keep doing it, folks; with so many willing targets, all of us who actually give two shits about security will be that much safer.

This is absurd. Unless you have personally audited the source* for every open source binary on your system and compiled it from that source yourself to verify that your binary came from it, adding a proprietary binary into the mix isn't going to change anything. * Or trust someone that has, which is still implausible.

Comment Re:very wrong (Score 2, Informative) 248

Blizzard has _nothing_ to do with incompentence of users which allow keyloggers and stuff on their computers. The fact that Blizz allows the recovery of your items/gold on _their_ costs, is a fact that you will never find anywhere else.

That's a bit extreme. Plenty of MMOs handle theft the same way. Customers tend to not resubscribe when their stuff is stolen and never returned.

Comment Re:Please, no. (Score 1) 554

We offer a complete or partial fee waiver for authors who do not have funds to cover publication fees. Editors and reviewers have no access to payment information, and hence inability to pay will not influence the decision to publish a paper.

Of course, they could avoid the problem entirely by charging for paper submission rather than publication.

Comment Re:Judging from... (Score 1) 243

This sounds like data mining, since essays are used to train their system. If so, their classifier can guess what a human would give a paper based on pre-defined textual features, but this classifier wouldn't necessarily be good at finding specific areas that need to be changed.

Comment Re:data connection? (Score 3, Informative) 194

Someone on the project page asked the guy who did this if the data connection worked. His reply was rather cryptic: "YES BUT DON'T DO THAT". If the person who managed it is recommending against it, the very same hoopy frood with the smarts who managed to go to all the trouble to hack Ubuntu onto the Kindle, then I gotta go with "it either doesn't work well enough to bother, or there's a really good reason why you shouldn't use it if it does".

Amazon only guarantees that the Kindle can be used to access a few websites (Wikipedia, Amazon, maybe one or two more), but they currently allow you to access all of the internet for free over Sprint's cellular network. Amazon pays for it.

If people were to start tethering their Kindles and using them as a means of getting free internet anywhere, it would become too expensive for Amazon to continue. This is probably why the author said not to use the data connection; he doesn't want Amazon to discontinue the free internet service.

Slashdot Top Deals

Our business in life is not to succeed but to continue to fail in high spirits. -- Robert Louis Stevenson

Working...