Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:Options (Score 1) 487

MAC filtering will stop random users from connecting automatically, but won't stop someone who is intentionally trying to gain access... Changing your MAC is trivial.

Agreed that _optout is offensive, why should i have to change the name of *my* network to cope with this crap, and where would it end? I shouldn't have to explicitly opt out of things i never have any intention of using and might not even be aware of.

The only real solution is a dedicated (isolated) guest network, with regularly changing keys... I don't have guests visiting all the time so i could easily generate a new key each time...

Comment Re:Google gets a free pass? (Score 1) 487

Any device that connects to wifi has to store the passwords either in the clear or in a retrievable form...

If you compromise the device, you can extract the keys (and a lot of other stuff too). Other devices just obfuscate the keys, but they are still retrievable (e.g. try wirelesskeyview or gsecdump for windows).

That's why virtually all platforms offer device encryption these days to lessen the chances of the device being compromised at all.

Comment Re:if that's true, (Score 1) 487

Limiting sites and protocols just causes problems, people will have their devices setup to connect to all manner of things (vpns, email, im, voip etc), and restricting what they can access will invariably block some stuff and render the connection unusable, causing a denial of service if the handset automatically connects to the wifi and loses its cellular connection where everything was working.

Comment Bullshit (Score 1) 843

The article is more than a little disingenuous. A more appropriate title would have been "The F35 multirole strike fighter can't dogfight against one of the greatest air superiority dog fighting planes every designed".

The F22 is the competition for the F16. The F35 is the competition for the F18 Superhornet and the A10.

No shit the F35 can't compete against the F16. It was never designed to.

Comment iOS users feel it (Score 1, Insightful) 311

I currently have a web radio transceiver front panel application that works on Linux, Windows, MacOS, Android, Amazon Kindle Fire, under Chrome, Firefox, or Opera. No porting, no software installation. See blog.algoram.com for details of what I'm writing.

The one unsupported popular platform? iOS, because Safari doesn't have the function used to acquire the microphone in the web audio API (and perhaps doesn't have other parts of that API), and Apple insists on handicapping other browsers by forcing them to use Apple's rendering engine.

I don't have any answer other than "don't buy iOS until they fix it".

Comment Re:Just run your own (Score 1) 147

Whether there's someone sitting on your line and grabbing your traffic or tampering with it is completely irrelevant because that problem exists in any case. By running your own resolver, you don't publish your queries directly to a third party on top of that and that's a good thing.

Comment That's what you get... (Score 1) 65

That's what you get when offering VPN access must include proper client configs because users are clueless and want to be "secure" by hitting a button.

I guarantee you that I could take the credentials of each and every one of these VPN offers, put them into my router and tunnel all my clients properly(!) without any leaks.

It's not the VPN that is flawed, it's the CLIENT SETUP. For people with a clue, that's a distinction.

Slashdot Top Deals

Anything free is worth what you pay for it.

Working...