Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:Eh? (Score 2) 99

Democracy is showing its cracks here in the US. I've wondered about moving to a different system so we don't keep the same people in office for decades:

I'd propose it be done like jury duty: Come every four years, every citizen's name is tossed in a hat, names are drawn, and those people are sworn into office. No, this isn't perfect, and statistically, there is a chance of getting some real crazies... but is that worse than politicians bought and paid for by campaign donations? Statistically, it will give a true cross-section of the population. It will also get rid of gerrymandering and other crap.

This can be combined with a "no confidence" vote mechanism for further checks/balances.

Comment Re:disclosure (Score 1) 85

A secure home server only makes sense. If you get a machine with hardware RAID, mirror the OS drive, then use RAID-Z2 [1] or RAID-Z3 for the data. If using Windows, then you get a choice between bit rot resilience with Storage Spaces + ReFS or deduplication with Storage Spaces + NTFS.

[1]: RAID-Z will find bit rot on a zfs scrub, but won't be able to fix it. RAID-Z2, RAID-Z3 and RAID-1... even ditto blocks can both find and fix it.

Comment Re:disclosure (Score 1) 85

The ironic thing is that "real" security is pushed to the side. Old fashioned things like gpg, PGP, proper backups [1][2], sandboxing, and other basic items tend to fall into disuse while "lets just stash it in the cloud and take their word for it, as they use 'encryption' and 'firewalls'" seems to be the mode of operation of the day.

For example, I've seen some "cloud encryption" systems that require one to set up an account... and where the actual encryption key is stored can be anyone's guess (the websites on some of those sites sure do not give any details other than logged in == file access, not logged in == no access.) For remote storage, I rather use a secure archiver (PGPZip, BCArchive, even WinRAR on occassion) for file archives and TrueCrypt or similar for disks. I just prefer to pack my own parachute when it comes to encryption.

[1]: People make fun of tape, but even a relatively older tape format like LTO-4 still can provide a lot of use. It would be nice to see a "consumer grade" format that can hold a couple TB native and can handle USB at multiple speeds so shoe-shining is minimized. Maybe even add a SSD as a buffer to further minimize issues with buffer underruns.

[2]: Copying documents to a cloud drive is not a proper backup. One delete command issued by malware, and that data is gone. This also applies to copying data to external hard disks or USB flash media... all it takes is something to run through all devices, run a blkdiscard on the device, and if that doesn't work, a dd if=/dev/zero of=whatever, and everything is gone. Using BD-R/DVD+R/CD-R media is closer to a better backup because if the disk is finalized, barring something on the burner's ROM, malware won't be able to tamper with that media. Proper backups are where media is offline, preferably with media sent to at least one offsite location. However, not many places do this right these days.

Comment Re:A weak approach (Score 1) 85

Another item is that a lot of enterprises have a data recovery agent. That way, if EFS is used, one just cracks open that key, decrypts everything, calls it done.

I'm sure this will be fixed in the next version of the software. Malware is the most well written and meticulously supported software being created in the computer industry these days.

Comment Re:Chinese getting uncomfortable... (Score 1) 100

Isn't the Yuan pinned to the dollar right now, so if China stopped accepting USD, it would only bite them, especially their debt holdings?

What is really worrisome is if China gets oil trade to move to a basket system and off the US dollar. Then things will get really pear-shaped, really quickly.

Comment Re:Chinese getting uncomfortable... (Score 1) 100

China isn't really Communist, nor communist. It definitely is a capitalist society with some vestiges of a command economy left, with the government having a voice as a part of any companies and ventures on their soil.

(All and all, that's not a bad thing... I wonder how better off the US would be if a FTC or SEC official had a say in all board meetings.)

It is a different culture. Some of what they have is good (they invested in core infrastructure while here in the US, cars were crushed, and China actually is trying to move to a decent UHC system), but some isn't.

Comment Re:He pretty much agrees with you on page 12. (Score 1) 277

What really needs to happen is separation of duties and storing the hashes the same way companies store private keys used for signing... a physically secure, hardened appliance with a limited interface out. Backups are done to a USB port physically on the appliance, and the data never is exposed on the network, only calls to use it.

We can use bcrypt, initial hashes, and such, but it might be better to consider a different protection method -- keep the data separate and physically isolated from everything else... i.e. put the hashes on their own separate box so that even if an attacker manages to get everything on the network, they only can access the stored hashes by trying user/password combos... and with a sane lockout method on the device with exponentially increasing lockouts, it is easy to prevent brute forcing an account.

Comment Re:Cool, but (Score 1) 32

What would be interesting is if the groups of devices could have their own individual WPA2 encryption key. That way, one wireless segment can use multiple keys in PSK mode. This way, if a smartphone is lost or changed out, just one password needs deleted rather than rekeying every device on the subnet.

Comment Re:They can teach whatever they want. (Score 4, Insightful) 163

Nail, head, hit. Even if someone had a device that had obvious security failings that were unfixable, the EULA/TOS by opening it up and turning it on would ensure that lawsuits would not proceed (either by forcing arbitration, or just a clause stating that it isn't their fault, no matter what.)

I have no interest in IoT. Realistically, what has to be on the Internet all the time and take commands? Why do we need to give devices full exposure if it isn't needed?

If someone wants status messages from devices, why not just have devices communicate via BlueTooth to a log box, and said log box present the data to where it needs to go? This would force an intruder to have to hack that core box, then use BlueTooth weaknesses to jump to actual devices, rather than just run scripts blindly and hope someone's widget shows up.

Comment Re:Don't use it anyhow. (Score 1) 496

It would take some thought on layout to have a system that works, where if a motorcycle is in a blind spot (and sometimes they will drive on the breakdown lane to pass), it will show it.

The idea would be a very useful advance, but it would have to be tuned to be able to have information coming in at a glance so one doesn't have to take the time to notice that there is something coming in from the side or whatnot.

Maybe one compromise is on the road already. Freightliner Sprinter vans have a LED that lights up on the mirror when something is in a blind spot, as well as a decent camera arrangement when backing up.

If I had to choose between cameras or mirrors, I prefer both (since cameras add useful information, especially backup cameras), but I'd take mirrors, just because I can gauge depth in them.

Comment Re:Where does article say "not enough openings"? (Score 4, Interesting) 161

There are jobs out there. However, the days of 2008 where one could put out 99 cent fart apps and rake in the cash, or the days of 2012 where one could put out a free-to-play, pay-to-win game are now behind us. The market is saturated.

But there are markets where things are not like that and niches can be made. Embedded programming will be work that requires a real expert, just because each application (and hardware device) is different. A microcontroller for a RV's A/C will require a completely different set of code than a microcontroller that monitors a building's HVAC system at multiple locations. One size does not fit all in the embedded arena, so "commodity development" (i.e. offshoring) will be more expensive than hiring people domestically since there is new ground to be broken.

I'm sure the next bubble is going to be security. SSL/TLS need to be reworked to support multiple root CAs in case one is compromised. That way, if two CAs have no clue about a cert, but one CA vets it, this can raise a red flag. Security isn't something one can do on the cheap. This needs real expertise, and more than just reading "The Cookoo's Egg" and calling oneself a "security professional". White/black hat hacking is going to be an important part of things, and this, yet again, isn't something that comes cheap.

Then there is the fact that there are international issues now. Just last year, people were content to get all their hardware from one country, their software from another. Now, nations want to pack their own parachutes and develop their security in house, and not rely solely on the word of other countries that the smartphones or other items don't come bristling with backdoors and kill switches. So, there will be duplication of effort that wasn't around just a year ago.

On this note, governments will become a bigger client for developers. They will want their own infrastructures, social media sites, and many other items. This will be where the money lies for upcoming companies because governments have deep pockets, and the ability to work on things even if not an immediate profit is obtainable.

Then there are items to be addressed that would make money, infrastructure wise. Here in the US, there is plenty of LAN bandwidth to go around. WAN bandwidth is expensive. Someone making an infrared laser routing system and other means (microwave relay) to create a mesh network would likely make a lot of money, especially if it has innate encryption that consists of more than "trust us, the glowing 'it is encrypted' LED ensures 100% security" flim-flam.

Finally, the model of advertising revenue is going to hit a wall pretty soon. Once ad-supported sites start selling to advertisers every click, mouse wiggle, and keyboard stroke that subscribers do, or even worse, demand intrusive spyware be installed on subscribers' machines, then there will be no more they can sell to the advertisers. Once that happens, the bubble will collapse. Who knows from there. "Free" E-mail may become a thing of the past, perhaps even Google or other search engine use would require micropayments.

All and all, there are still niches to be filled. One just can't follow the herd all day long and expect to be able to get to fresh grass.

Comment Re:Voltage != Power (Score 2) 208

From the picture, it is even worse: "5V current ranges plus USB PD."

Realistically, how many amps is thing thing going to allow? 100 watts means that those wires will handle 20 amps, and handle this factoring in voltage drops, especially with the skinny cables and tiny connectors.

Realistically, I wish the USB-C connector could start at 5 volts but negotiate to 12 volts to offset voltage drop. Higher voltages would help more, but then there will be electrocution issues past 12-24 volts depending on a lot of factors. It would be nice to push 48 volts through two wires dedicated to power because that would easily allow 100 watts... but would one trust the bottom-basement Chinese electronic junk with such a high voltage that a short or a misrouted connection doesn't fry other connections or shock the user? I wouldn't.

Even at 12 volts, 10 amps through those small wires is asking a lot, so realistically, 100 watts of power is a joke. I'd expect at most 20-25 watts unless magically the USB consortium is able to spec and deliver on superconductive wires or goes to thicker cables and connectors.

However, any improvements from the usual 2.1 amps through current USB connectors is definitely a step in the right direction.

Slashdot Top Deals

Function reject.

Working...