Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:it's gotten much, much worse (Score 3, Interesting) 101

What really pisses me off is that Amazon used to have an option called "frustration free packaging", which used generic brown cardboard with minimal print instead of ugly ass plastic layers, and it was easy to open without any tools. That feature is LONG gone.

Because, yes, we all need over-sized retail hang tab packaging when ordering shit on the internet, am I right !?

Comment Re:DisplayPort (Score 1) 114

it isn't software, it is pure hardware. they've gone to great lengths to make this thing work a hell of a lot better than anything else.

"software" would add latency, not really support VRR, and fail at things like 4k/240Hz, which is all supported on their KVM.

their KVMs cost $$$ because they're the bleeding edge of switching hardware.

how much does a 40gbps ethernet switch cost? because that's about how much bandwidth this thing is passing through it.

Comment Re:The '90s called. (Score 1) 228

I think you should read the entire NIST document.

I believe what you're referencing is in regards to pin authentication, NOT password authentication. There are multiple references to passphrases and other authentication methods too.

That is a very VERY lengthy document, if you cherry pick a single sentence without the surrounding context, sure, any one singular thing from it could potentially sound bad, but the document goes into great details about exactly what you're describing with entropy and brute forcing.

Comment Re:The '90s called. (Score 2) 228

"Seriously. Go fix some real problems like standardizing password complexity rules or encouraging developers to use alternatives to passwords."

Spoken like someone far outside of the infosec space.

There is literally an organization inside of the United States Federal Government that does just this:
https://pages.nist.gov/800-63-...

Comment Re:Can they hijack the mic to get this info? (Score 1) 42

From the actual PDF paper, they go into details about various conferencing apps like Skype, Zoom, Teams, etc where the audio would already be available to a remote entity.

Essentially think of it like screen-sharing and typing in your credentials for someone else to see.

And yeah, while the attack vector currently has a low probability of success, things like this only get better with time.

I still remember from many MANY moons ago a research paper on recreating a house key from a low resolution photograph taken with a flip phone from that era, and now we're all walking around with 4K cameras in our pockets with insane zoom lenses with better clarity and greater ISO tolerances.

Slashdot Top Deals

UNIX is hot. It's more than hot. It's steaming. It's quicksilver lightning with a laserbeam kicker. -- Michael Jay Tucker

Working...