Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Interessting in any case (Score 4, Interesting) 109

While I also doubt that this is possible today, I am sure the NSA is looking at placing the respective sensors. Then we will have to do "analog routing" and mix in mains hum form several places to obscure where and when things have been recorded. Maybe we should start to offer recordings of local grid noise. Would not be that difficult to do.

Well, fighting fascism is difficult. But there really is no alternative for anybody with at least a shred of noncompromised personal ethics. The price of doing nothing is just way to extreme.

Technology

Nathan Myhrvold's Recipe For a Better Oven 228

Tekla Perry writes: We cook our food today using technology invented to bake bricks. We can do a lot better. Nathan Myhrvold explains what's wrong with today's ovens and challenges oven designers make them better. He says, "Oven designers could do a lot to make ovens heat more evenly by taking advantage of the different ways ovens transfer heat at different cooking temperatures. At 200 C or below, convection moves most of the heat. But at 400 C, radiant energy starts doing a fair amount of the heat transfer. At 800 C, radiation overwhelms convection. Why couldn't we have an oven designed to cook primarily by convection at low temperatures that switches to radiant heating for high-temperature baking? ... The shiny skin of raw fish reflects heat, but as the skin browns, it reflects less and less energy. That’s why food under a broiler can seem to cook slowly at first and then burn in the blink of an eye. But technology offers a fix here, too. Oven designers could put optical sensors in the oven chamber to sense the reflectivity of the food, and then the oven controller could adjust the heat automatically or at least alert the cook as the surface browns. And a camera in the oven could feed to a color display on the front panel, giving the chef a clearer view of the food than a small window in the door can. Indeed, a decent optics system could allow designers to dispense with the glass in the door altogether, reducing the gap between the hottest and coolest corners of the oven and obviating the need to open the door and rotate the food midway through cooking.
Google

Supreme Court Rejects Appeal By Google Over Street View Data Collection 113

An anonymous reader writes "The U.S. Supreme Court declined to throw out a class-action lawsuit against Google for sniffing Wi-Fi networks with its Street View cars. The justices left intact a federal appeals court ruling that the U.S. Wiretap Act protects the privacy of information on unencrypted in-home Wi-Fi networks. Several class-action lawsuits were filed against Google shortly after the company acknowledged that its Street View cars were accessing email, web history and other data on unencrypted Wi-Fi networks. A Google spokesman said the company was disappointed that the Supreme Court had declined to hear the case."

Comment Re:If only this was a Microsoft issue. (Score 1) 215

You do not seem to understand what this discussion is about. It is about security, not safety. And when it is about security, the wildcards come from somewhere else and need to be sanitized in that path. A user doing this to himself is just stupid, but not a security issue. (And yes, as somebody that once had to recompile bash to get a longer commandline-buffer, I know exactly where the expansion happens.)

Comment Re:Lets quote FD while we're at it (Score 2, Interesting) 215

It may be counter-intuitive for people that have very little experience with a UNIX commandline. All others did run in the issue at some time that they could create, but not easily delete a filename "-v" or the like. But people with very little UNIX commandline experience have zero business writing security critical software that uses the commandline tools!

This is a complete non-issue. Incompetent people will usually screw security up and this is just one of the countless ways to do it.

Comment Re:If only this was a Microsoft issue. (Score 1) 215

That is complete BS. Preventing users from doing things they legitimately want to do is not a valid approach to securing untrusted interfaces. The valid valid way is to sanitize the untrusted input before using it and only a complete moron will pass a wildcard from an untrusted source, unless it cannot do any harm where it is going.

Comment Incompetent people will always mess things up... (Score 2, Interesting) 215

Really, this is well-known, non-surprising and will not happen to anybody with a security mind-set. Of course it will happen in practice. But there are quite a few other variants of code injection (which this basically is) that the same people will get wrong. Complete input sanitisation is mandatory if you need security. I mean, even very early Perl-based CGI mechanisms added taint-checking specifically for things like this. If people cannot be bothered to find out how to pass parameters from an untrusted source securely, then they cannot be bothered to write secure software.

The fix is not to change the commands. The fix is to exchange people that mess things this elementary up against people that actually understand security. Sorry, you cannot have developers that are cheap and competent at the same time and even less so when security is important.

Slashdot Top Deals

The brain is a wonderful organ; it starts working the moment you get up in the morning, and does not stop until you get to work.

Working...