Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:Lots of good reasons. (Score 5, Interesting) 684

I've written DRM that is good for the "customer" (user). It's a bit bizarre, though. More like reverse DRM. It's purpose is to ensure that the software isn't "pirated" and sold for money, instead of downloaded for free, as it should be.

I'm one of the authors of BootMii and The Homebrew Channel for the Nintendo Wii. It's a free (as in beer) piece of software that you can use to run untrusted code on your console (what people like to call jailbreaking these days). Before it had any kind of security, we found out that scammers were selling it (in violation of our license) along with "piracy packs". We added a big "scam warning" to the installer to clue users into the fact that the software is free, and if they have paid for it they have been scammed. However, the scammers started telling users to use the same tools used to pirate WiiWare games to install The Homebrew Channel itself - this bypasses our installer and the scam warning. So we added DRM that ties each install to a given console (if you try to copy it, it still works, but then you get the scam warning every time you try to use the software instead, until you reinstall it using the proper installer). There's enough obfuscation to stop the (generally clueless) scammers from working around it.

I'm nominally very anti-DRM, but I've thought long and hard about this and I really can't see a significant downside for users. It doesn't affect normal users in the slightest, as far as I can tell. It doesn't actually prevent anything from working (sometimes, you can damage system firmware such that The Homebrew Channel is one of the few or the only option left to repair it, and you can't run the installer - we never want the DRM to accidentally close off a user's last hope for their console, so it's designed to be extremely annoying if the check fails, but not actually stop working). Of course, it doesn't prevent you from installing it on as many consoles as you want - just use the installer (which is a great idea for many other reasons anyway - it's so paranoid about system checks and safety that it has never bricked a single console in millions of installs) and you're fine.

Comment Re:Will the bumblebee project still be necessary? (Score 5, Interesting) 123

As far as I can tell, this only adds support for using the nvidia card for everything (rendering the whole desktop) while sending its final framebuffer to the Intel for scanout. This is a strictly different use case from what bumblebee enables (rendering *specific apps* on the nvidia card while using the Intel for everything else).

Personally, since I only need the performance of the nvidia card one in a blue moon, the bumblebee approach is much more useful to me. Otherwise, I'd have to deal with tearing on everything (the current version of the nvidia RandR output provider does not support vsync) and increased power consumption.

I think what nvidia calls "render offload" in their README (which is currently not supported) is what would in fact replace bumblebee, if/when implemented. I'm curious as to how it would interact with power management, though. One of the very nice things about Bumblebee is that it doesn't even power up the nvidia card (via ACPI) until required, and that's easy because it starts up a background X server on demand to do the rendering. It's probably trickier to puil this off if you have to load the nvidia driver into your primary X server to take advantage of the direct integration.

Comment Re:Noise canceling headphones (Score 2) 561

The active noise cancellation indeed only works for low frequencies, but noise-cancelling headphones muffle higher frequency noise by design too. I find them quite acceptable in very noisy environments, and I suspect they will work well anywhere where there's a wall between you and the noisy human anyway. If you must, feed them white noise to drown out what remains.

Comment Re:links to NIST (Score 1) 134

First of all, you mention the TCP/IP checkum, at the same time as key exchanges, long PSKs, and money transfer. Which is it, simple message integrity or message authentication? If you need authentication, you shouldn't even be mentioning TCP/IP checksums. If all you need is integrity, then just append an MD5.

Assuming you need authentication: I don't have any opinion on Blake2, but you should use an HMAC instead of just appending the shared secret key and taking the hash. HMAC can be built on top of any hash function, including Blake2. You should also make your MACs at leasts 128 bits long, preferably 192 or 256. 64 bits is definitely bruteforceable these days. I wouldn't settle for anything shorter than 256 for a protocol that involves money.

Keep in mind that a basic message authentication code is only one piece of a secure protocol. There are many possible attacks that might slip through (e.g. replay attacks, MITM, timing attacks, ...). For example, you need to ensure that an attacker can neither reinject a message from the current session back into it (e.g. by using a sequence number in the signed payload) nor reinject a message from a different session (e.g. by ensuring that there is a random component to the shared secret) nor somehow guess the right MAC code (e.g. by making sure that the wrong-MAC responses do not leak any information, neither in contents nor timing), and of course there's always the host identification problem (preventing a simple MITM where the attacker performs a key exchange with both sides and resigns/reencrypts traffic both ways). Honestly, your first choice should be to use an existing well-tested protocol, such as TLS (you can build your own host verification rules on top of it, you don't have to use the "well-known" root CA list). Failing that, consult a real crypto expert.

Comment Re:links to NIST (Score 5, Informative) 134

For password hashing, that is correct. However, cryptographic hash functions are not designed for such use (and yes, all the websites and services out there using plain hashes for passwords are Doing It Wrong, even if they are using a salt). You can build a good password hashing scheme out of a cryptographic hash function (for example, PBKDF2), but plain hash functions are not suitable (precisely because they are too fast).

Fast cryptographically secure hash functions are a Good Thing, so you can hash a given block of data (and thus compute its digest and e.g. verify its digital signature) as fast as possible. This speeds up things like GPG, SSL, Git*, good old sha1sum checksums, etc. If you then want to use such a hash function as the core of a password hashing scheme, you can compensate for the extra speed by simply increasing the number of iterations. Making a hash function slower is always easy.

*Git is pretty much stuck with SHA-1 for now, but future incompatible versions of the repo format could conceivably switch to a faster hash function if it made sense.

Comment Re:It's a very sad thing to admit, but (Score 4, Interesting) 260

Which means the Optimus solution isn't actually all that bad. I have the opposite viewpoint: I bought an Optimus laptop assuming the nvidia wouldn't work, simply for the other specs and the Intel video. When it turned out that bumblebee worked fairly painlessly and I was able to use the nvidia to accelerate 3D while the Intel drove my displays, I was pleasantly surprised. The solution is a bit of a hack, but honestly, I don't really have anything bad to say about it. It's the best of both worlds: open Intel drivers which are stable and support modern interfaces like XRandR 1.3 and KMS driving the displays, and the clunky proprietary but fast nvidia driver sandboxed in its own backgrond X server doing 3D acceleration only.

Comment Re:Sensationalist article stating the obvious (Score 2) 218

It is true that the law grants the copyright owner the right to restrict the creation of copies, but It can be reasonably argued that by posting the code on GitHub you've implicitly given consent to the mere creation of a copy (as would automatically happen if you view the code or download it). For most practical purposes, the limitation on distribution is what matters.

Comment Re:Will this chargers be "always on"? (Score 1) 82

How did you measure the power usage? If you used a cheap power meter that does not have accurate power factor measurement, then your measurements are completely useless. Idle switching power supplies have very low power usage, but a very low power factor, because they act as capacitive loads. This means that a naive current meter will measure all of that out-of-phase current and you'll end up with a grossly inflated power figure. A proper power meter measures both instantaneous voltage and current many times during each AC power cycle, and can therefore report both real power and apparent power. If you measure an idle switching wall wart with such a meter, you will see a low W (real power) figure and a high VA (apparent power) figure. Residential customers are usually charged for real power only.

Comment Re:Too much of a good thing? (Score 3, Interesting) 82

That isn't caused by overcharging, it's caused by the battery simply being at 100% charge. Li-ion batteries like to be stored at 40% charge, and degrade much faster at 100%.

The technical solution to this problem is a trivial firmware change to the charging controller to only charge the battery to 40%. However, I suspect nobody has done it because nobody has figured out how to get the users to switch to "40% maintenance charge mode" when always plugged in, without pissing them off when they run off and discover that their device is only 40% charged. The fundamental problem is being able to predict when the user will need to actually use the battery, and only fully charge it immediately prior.

Comment Re:Word (Score 0) 586

It's successful itself, but not that successful for its users, though. One of the chronic problems of Arduino is that many people become mentally attached to it and exhibit extreme reluctance to ever move beyond it, learn how it really works, or (gasp) build a project that isn't an Arduino shield. When they find a problem that the Arduino isn't great at, they go to great lengths to solve it while keeping the Arduino (using e.g. more external logic, more than one Arduino, or, in extreme cases, throwing an FPGA on top of the Arduino - and implementing a coprocessor on it that is more powerful than the Arduino itself).

Very often, these problems can be solved much more efficiently by building your own hardware from a bare microcontroller, which is actually a very easy task - the Arduino is little more than a breakout board. Alas, while some Arduino users do realize this (and use bare AVRs, both the ones on Arduinos and other models, or even other brands, to great effect), most do not. Now that Arduino is moving to ARM, this will get marginally worse - if people aren't taking the plunge and figuring out how to use a bare AVR (which is completely trivial to bring up on a breadboard), moving to a surface-mount part that has slightly more complex requirements is not going to make things better.

The same thing happens, to a different extent, on the software side. I've seen many projects that are coded as a humongous unreadable Arduino sketch, when by that point the authors really ought to have learned how to modularize their code (and format it properly, too). It doesn't help that the Arduino IDE isn't a particularly great text editor.

The Arduino is a great learning platform, but it does the "make it easy" experience so well that people are very afraid of moving beyond it, and this ends up creating an artificial learning curve further down the line that is hard to get past. If you're forced to experience bring-up of a micro on a breadboard from the first day, you quickly figure it out (it's really easy), but if you've been comfy in Arduino land for months/years, it feels a lot scarier than it really is. (What do you mean I have to provide my own regulated power supply? And the pins, they don't have labels! Where is the USB connector?). I don't even blame the authors of Arduino; for example, they do include code that can program a bare AVR using an Arduino as a programmer (with visual wiring diagrams even, IIRC), which is exactly the kind of thing that you want to help people bootstrap themselves, but people still just aren't doing it.

Slashdot Top Deals

Eureka! -- Archimedes

Working...