Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Businesses don't run Oracle because they want to (Score 3, Insightful) 65

They run it because they have to. Didn't always used to be that way, but I've not seen significant technical innovation out of Oracle in a very, very long time. And given their other disasters with managed services, if I were running Oracle, I certainly wouldn't entrust it to their cloud service.

Comment If you can touch it, you can own it (Score 4, Informative) 89

"Assuming an attacker has access to the computer's console"

I was always taught that this pretty much means game over. It might be an interesting way to get a root shell, but if I am sitting in front of the machine with console access, I can think of a number of other ways to get a root shell.

Submission + - New cloud attack takes full control of virtual machines with little effort (arstechnica.com)

C3ntaur writes: From Ars Technica, http://arstechnica.com/securit...

The world has seen the most unsettling attack yet resulting from the so-called Rowhammer exploit, which flips individual bits in computer memory. It's a technique that's so surgical and controlled that it allows one machine to effectively steal the cryptographic keys of another machine hosted in the same cloud environment.

Until now, Rowhammer has been a somewhat clumsy and unpredictable attack tool because it was hard to control exactly where data-corrupting bit flips happened. While previous research demonstrated that it could be used to elevate user privileges and break security sandboxes, most people studying Rowhammer said there was little immediate danger of it being exploited maliciously to hijack the security of computers that use vulnerable chips. The odds of crucial data being stored in a susceptible memory location made such hacks largely a matter of chance that was stacked against the attacker. In effect, Rowhammer was more a glitch than an exploit.

Now, computer scientists have developed a significantly more refined Rowhammer technique they call Flip Feng Shui. It manipulates deduplication operations that many cloud hosts use to save memory resources by sharing identical chunks of data used by two or more virtual machines. Just as traditional Feng Shui aims to create alignment or harmony in a home or office, Flip Feng Shui can massage physical memory in a way that causes crypto keys and other sensitive data to be stored in locations known to be susceptible to Rowhammer.


Comment Not *really* selling student loans (Score 3, Insightful) 49

Sounds to me like they want to *write* student loans. Which is quite different from selling them. I would be interested in buying the notes, if that's what they were selling. Usurious interest rates, no chance of discharge in bankruptcy, no expiration. This is the kind of investment vehicle I would want to own.

Comment Lights, cameras, ... (Score 1) 111

I recently stayed in a hotel that provided a tablet in every room for accessing amenities, such as room service. It appeared to be equipped with a camera and microphone, as most tablets are. And I have little doubt the security at that hotel was as bad as what the poster described.

Comment Re:The Cloud (Score 1) 446

The government already has all that, they don't need to break into DropBox or OneDrive to read that stuff.

True, and the government is not my main concern with putting sensitive data, albeit encrypted, in the cloud. My main concern is that someday, the encryption might be broken. Once that happens any script kiddie with the right tools can to get to the data, and there's no sure way to remove it from the cloud.

Comment Re:The Cloud (Score 2) 446

you will be at no risk of hackers or anyone else gaining access that way

I disagree. Encryption algorithms are constantly being tested and broken, and there is great incentive for that to continue. From the NSA and other governmental entities deliberately weakening the tools we use to encrypt, to as-yet undiscovered flaws, nobody can say with 100% certainty that current encryption technology will forever be secure.

And that's the biggest problem with the cloud. Once a single copy has been posted, you no longer have a sure way to delete every copy in existence.

Slashdot Top Deals

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...