Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Be Careful What You Wish For (Score 1) 631

There is no what it "might do" it is what they have been actively doing, and trying to get money out of...Also there is nothing in this that allows the NSA to get taps on it.

While NN provides protection against overt violations such as outright blocking or throttling of competing interests this hasn't been the vehicle used. There isn't some machine at the ISP explicitly designed to slow down or block all traffic to somewhere the ISPs dislike...it is all much more subtle than that. Hey look x victim interconnects with y,w and k so we will pref z,o and p to keep links g,h,i,j saturated. Then we will claim it isn't "our fault" your *** is slow.

I still believe the only solution that at all stands any chance of working are focused efforts to restore a competitive market. Break up monopolies, FRAND access to last mile, erasing anti-competitive legislation, etc.

Also there is nothing in this that allows the NSA to get taps on it.

I will assume you have carefully read all 317 pages which is great. I'm embarrassed to say I can't even find the text.

Comment Known unknowns (Score 1) 99

The failure is business models requiring secrets to be burnt into hardware by manufacturer.

When customer takes delivery they should be responsible for installing keys.

Otherwise events like RSA FOB compromise or the proverbial safe company with stolen customer and combination lists will continue.

The only defense against mass exploit is decentralization. Not only does it make prospect of "0wn1ng th3 w0rld" less likely it keeps you from presenting a massive target to extremely well funded adversaries.

Comment Mr Rogers imaginary neighborhood (Score 1) 406

So âoebackdoorâ is not the context I would use. When I hear the phrase âoebackdoor,â I think, âoewell, this is kind of shady. Why would you want to go in the backdoor?"

In venues I have read or listened to NSA brass speak they come prepared with exotic definitions of plain language and seek to confuse and manipulate perception by invoking nonsense that would give most lawyers a run for their money.

Completely Ignoring underlying topic when you act like a weasel hard to understand how it is you expect to earn any respect or consideration for your cause.

Comment Re:This is the End, Beautiful Friend, the End. (Score 1) 279

Moore's Law had a good run, but she's dead Jim. Two, maybe 3 shrinks at most, and you're at the end of getting benefit from feature size.

Moore's law is really all about "cost" per transistor. While process shrinks are certainly an important enabler they don't have to be the only driver that keeps things going.

Comment Circle of weeds (Score 2) 95

Anyone smart enough to write an HTTPS proxy able to dynamically create and sign certs surely must have known enough about underlying technology to recognize and comprehend importance of validating trust chain. How does someone innocently "overlook" this in either design or test? Simply MUST have occurred to someone.

Comment Re:Software testing ... what a novel concept (Score 1) 108

At least this article admits to a level of "programmer error". However --- like most "computer error" news articles, this one misses a key point: This (like many others) is actually management error. Management failed to oversee programmers. Management failed implement test. Management failed.

Assuming story on its face is true the blame for failure to recover goes to IT hierarchy responsible for managing the database. No data programming error should have the capability of causing unrecoverable data loss. It isn't so much you guard against someone or something typing DELETE FROM ... as much as retaining ability to restore database to a transitionally consistent state immediately prior to execution. There is no excuse for failure to retain a chain of log backups.

Comment Re:Ah yes... (Score 1) 108

The good old "DELETE FROM records WHERE 1;.... FFFFFFFFFFFFFUUUUUU----" on the production system on a Friday afternoon...

Even then you would have to be a hack to not be able to recover a snapshot of database prior to the incident from redo log.

Properly managed capability to see database as it existed at any point in time is maintained throughout the useful life of the database with no exceptions.

Comment Re:NSA... (Score 1) 192

I think we all need to work together to get rid of this terrible, nasty, unpredictable hacker group -- for the sake of national and international security. They represent a clear and present danger to the future of this country.

I think time would be better spent improving systems especially communication systems to deny all adversaries capability to "hack the planet".

Aggregating sources of trust like this is akin to piling gold bars on the street corner, holding a press conference announcing to the world their presence and being surprised when gold turns up missing next morning.

Comment Re:Stasi Tech? (Score 1) 130

Because voice processing and searching on the scale of some of the applications such as SIRI require centralized processing.

I don't buy it. These sentiments jumble a number of separable components.

Have a 10 year old device was able to do local speech recognition including arbitrary voice shortcuts and search without training. I would tell it to play song x or anything from artist y and it would most of the time get it right and just do it all offline and all on hardware at least an order of magnitude less capable than what is available today.

There are PC software packages such as Dragon and Sphinx able to do free-form speech to text locally.

You don't need "the cloud" to control a TV. Recognizing a short list of commands to control a device is relatively trivial. There is nothing wrong with searching online databases if that is explicitly necessary... What is wrong are generation of bullshit excuses to collect usage data by virtue of voice enablement. People have never really gave a shit about voice recognition enough to justify any serious R&D expenditure. Vendors push it because they want revenue stream that goes with data collection.

Comment No words (Score 5, Insightful) 144

Preloading advertising spyware with a new computer while knowingly disabling all https and code signing security.

There is selfish, there is stupid, there is dumb and there is criminal batshit insanity.

Having been a fan of Lenovo for years I sincerely hope they are sued into oblivion and face criminal prosecution. No need wasting your time wondering if I will ever buy anything from them again.

Comment Goodbye Razor of Hanlon (Score 1) 153

I suppose this makes sense. If you select port 80 it is more likely to be noticed or more likely to be intercepted and or mangled by proxies and AG's making it difficult to transport non- HTTP data streams.

Port 443 would best allow for unmolested arbitrary stream while remaining most unlikely to be filtered.

The rest I can't explain... is there really such a big ass market for ads and data justifying such behavior or is some of this at least partially being "subsidized" by state actors? The mindset and thinking not just of Samsung but of growing numbers of vendors strikes me as both disgusting and unsustainable.

Slashdot Top Deals

"I've got some amyls. We could either party later or, like, start his heart." -- "Cheech and Chong's Next Movie"

Working...