Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:The Problem Isn't "Free Speech vs Privacy" (Score 1) 278

The question here is the lifespan of he "news", not how you classify their support (paper vs. internet, search vs. non-search etc). Traditionally this lifespan was limited to a few days while the said newspaper was on the stands. After that, access to those news was becoming cumbersome, i.e. like in having to go to the library and manually scroll through miles of archived microfiche. This 2 tiers system (news stands vs. microfiche) was ensuring that, while the information was still retained, you were practically "forgotten" and "out of the news" for the purpose of daily life. Obviously a newspaper could have elected to later regurgitate the same news and publish them again on the front page; however, they couldn't do this forever (you being on the front page for months for exactly the same news may have ended in a harassment lawsuit).

With the advent of internet, there's only one tier of "archiving", i.e. those news are always one search/click away from the public, making them "front page" for ever.

Submission + - "Secret" 3G Intel Chip Gives Snoops Backdoor PC Access (infowars.com)

An anonymous reader writes: vPro processors allow remote access even when computer is turned off

Paul Joseph Watson | Infowars.com | September 26, 2013

http://www.infowars.com/91497/

Intel Core vPro processors contain a "secret" 3G chip that allows remote disabling and backdoor access to any computer even when it is turned off.

Although the technology has actually been around for a while, the attendant privacy concerns are only just being aired. The "secret" 3G chip that Intel added to its processors in 2011 caused little consternation until the NSA spying issue exploded earlier this year as a result of Edward Snowden's revelations.

In a promotional video for the technology, Intel brags that the chips actually offer enhanced security because they don't require computers to be "powered on" and allow problems to be fixed remotely. The promo also highlights the ability for an administrator to shut down PCs remotely "even if the PC is not connected to the network," as well as the ability to bypass hard drive encryption.

"Intel actually embedded the 3G radio chip in order to enable its Anti Theft 3.0 technology. And since that technology is found on every Core i3/i5/i7 CPU after Sandy Bridge, that means a lot of CPUs, not just new vPro, might have a secret 3G connection nobody knew about until now,"reports Softpedia.

Jeff Marek, director of business client engineering for Intel, acknowledged that the company's Sandy Bridge" microprocessor, which was released in 2011, had "the ability to remotely kill and restore a lost or stolen PC via 3G."

"Core vPro processors contain a second physical processor embedded within the main processor which has it's own operating system embedded on the chip itself," writes Jim Stone. "As long as the power supply is available and and in working condition, it can be woken up by the Core vPro processor, which runs on the system's phantom power and is able to quietly turn individual hardware components on and access anything on them."

Although the technology is being promoted as a convenient way for IT experts to troubleshoot PC issues remotely, it also allows hackers or NSA snoops to view the entire contents of somebody's hard drive, even when the power is off and the computer is not connected to a wi-fi network.

It also allows third parties to remotely disable any computer via the "secret" 3G chip that is built into Intel's Sandy Bridge processors. Webcams could also be remotely accessed.

"This combination of hardware from Intel enables vPro access ports which operate independently of normal user operations," reports TG Daily. "These include out-of-band communications (communications that exist outside of the scope of anything the machine might be doing through an OS or hypervisor), monitoring and altering of incoming and outgoing network traffic. In short, it operates covertly and snoops and potentially manipulates data."

Not only does this represent a privacy nightmare, it also dramatically increases the risk of industrial espionage.

The ability for third parties to have remote 3G access to PCs would also allow unwanted content to be placed on somebody's hard drive, making it easier for intelligence agencies and corrupt law enforcement bodies to frame people.

"The bottom line? The Core vPro processor is the end of any pretend privacy," writes Stone. "If you think encryption, Norton, or anything else is going to ensure your privacy, including never hooking up to the web at all, think again. There is now more than just a ghost in the machine."

Facebook @ https://www.facebook.com/paul....
FOLLOW Paul Joseph Watson @ https://twitter.com/PrisonPlan...
---------------------------------------------
http://www.intel.com/content/w...
http://news.softpedia.com/news...
http://www.popularresistance.o...
http://www.tgdaily.com/hardwar...
http://infowars.com/
http://prisonplanet.com/

Submission + - How to conserve digital data for 100 years (vremenskitrezor.hr) 1

ssasa writes: A bank has a marketing effort to conserve small items in their time capsule that will be closed for 100 years. I'm considering to store some digital data (photos, videos, files or so). But which format to use and to be somehow sure it will survive and be close to a technology that would be readable in 100 years? DVDs, USB keys, USB drives all seams to last only few years. Any thoughts on this?

Submission + - 4 Best Free Pascal Books (linuxlinks.com)

An anonymous reader writes: Pascal is an imperative and procedural programming language designed in the late 1960s by Niklaus Wirth to teach structured programming using subprograms called procedures and functions. The language is a direct descendent from ALGOL 60, and takes programming components from ALGOL 68 and ALGOL-W.

The focus of this article is to select the finest Pascal books which are available to read without charge. Each text has a lot to offer for a budding Pascal programmer. So get reading and learning.

Submission + - Why Octopuses Don't Tie Themselves in Knots (sciencemag.org) 1

sciencehabit writes: Why don’t an octopus’s arms become hopelessly entangled? Their appendages can move with seemingly infinite freedom, forming far more postures and positions than their brains could possibly keep tabs on. The key, according to a study published online today in Current Biology, is chemicals in their skin. By examining amputated octopus arms of the common octopus, researchers have found that the creature’s suckers don’t latch on to its own arms the way they snare everything else. Petri dishes coated with intact octopus skin became “immune” to the zombie arms. The same occurred if the skin was ground up into a mush and spread over the petri dish, implying that a special substance in the skin is responsible for repelling the suckers. That’s important because octopuses have been known to dine on their comrades. So somehow a chemical in their skin not only keeps them from tangling themselves up, but it also prevents them from eating themselves alive.

Submission + - Open Source Software universities Ranking (OSuR 2014) (portalprogramas.com)

An anonymous reader writes: My name is Raphel Cervera and I'm writing you from PortalProgramas Technological Observatory (http://en.portalprogramas.com/observatory/).

I want to report you that we've just published the 1st Open Source Software universities Ranking (OSuR 2014): an study that aims to measure engagement, use and promotion of Open Source software in United States universities.

This project analyze the work of more than 297 American universities in creation and divulgation of Open Source software. In fact, 18 criteria and indicators divided into 4 different aspects have been used for statistical analysis. You can discover the results (and the followed methodology — Creative Commons 3.0 attribution) on the website of OSuR 2014:
http://en.portalprogramas.com/...

  Press kit for OSuR: http://en.portalprogramas.com/...

  Meet the team behind OSuR: http://en.portalprogramas.com/...

Thanks for your attention, feel free to share this information by any desired means.

Regards.

Submission + - Unlock Your Android Phone with Open Source Wearable NFC (adafruit.com)

coop0030 writes: Beck Stern at Adafruit has created a guide on how to create an open source NFC ring or other wearable to mod and unlock your Android phone. From the tutorial:

Unlock your phone by just picking it up! No more pesky password or gesture PIN, just scan an NFC tag! This guide covers creating an NFC ring, putting an NFC tag in your nail polish, modding your Android installation to read tags from the lockscreen, and creating an automation toolchain to unlock the phone when the desired tag is scanned.

There is also a video that demonstrates how it works.

Submission + - The Reality Of A High-Tech Scam: Less 'Hackers,' More 'Fargo' (itworld.com)

jfruh writes: High-profile breaches into Target and other huge retailers may make the world of computer fraud seem more glamarous than it actually is. Most are pretty low-rent and fairly bumbling, as in a recent case in Southern California, featuring corrupted cash registers sold to Subway franchises, fake gift cards sold over Craigslist and hand-delivered to buyers, and arrest, and only $40,000 made for all the trouble.

Submission + - FitzPatrick nuclear plant put off repairs, now plagued by water leaks (syracuse.com) 1

mdsolar writes: An aging cooling system at the FitzPatrick nuclear plant in Oswego County is springing leaks so often that plant operators had to reduce power 11 times during the first three months of 2014 so that workers could plug the leaks.

FitzPatrick's condenser, which circulates Lake Ontario water for cooling, leaks far more any other U.S. plant, in part because FitzPatrick operators failed to repair the aging equipment, according to the U.S. Nuclear Regulatory Commission.

Now the leaks cause FitzPatrick to reduce power so often that the NRC keeps the plant under heightened oversight....

The condenser is the normal "heat sink'' for energy produced by the reactor core. If the condenser is unavailable, steam produced by the reactor core flows through pipes down into a large water well called the torus and gets cooled there, Lochbaum said. Other emergency systems cool the water inside the torus to allow it to continue to function as an energy sponge.

An unreliable condenser only becomes a safety issue if the backup systems fail also, Lochbaum said. That's what happened at the Fukushima meltdown in Japan. But allowing the condenser to deteriorate creates a "pre-existing impairment,'' Lochbaum said.

"If the luck runs out and the pre-existing impairment factors into a nuclear accident, it'll be hard for Entergy and the NRC to claim they took all reasonable measures to avoid it,'' he wrote.

Comment Re:Google.eu Homepage (Score 1) 153

Because of the nature of their work. They make public appearances, where they address the public. Any news related to these are of public importance. OTOH what they do in their backyard is not addressed to the public and shouldn't be in the news unless they're doing something illegal.

Comment Re:Google.eu Homepage (Score 1) 153

Corrected for you: "some newspapers publish intensely personal information about public servants and celebrities". The average guy (like the one in the OP) does not expect that "intensely personal information" is published on internet and made searchable by a popular engine. If you're not a public figure, a rock start or on FBI/Interpol 10 most wanted list, you shouldn't be on internet without your knowledge and approval.

Comment Re:How is it broken, exactly? (Score 2) 162

Otherwise as far as I am aware the only way to stop "mischief" is to turn the Internet into a trusted network.

Not this won't really work, what would you do, after verifying the identity of the other party and comparing with your whitelist you would assume that it's "trusted" and thus well behaved citizen. Which may not be true (compromised host with a trojan sending malformed packets etc).

The only robust method would be to assume at protocol design phase that the stack would be connected to a hostile environment where every single packet could be mischievous. "Trust no one" and design to not crash in such conditions.

Comment Re:Google.eu Homepage (Score 1) 153

Still a valid point. Why should personal info appear on internet when it was never your intention to put it there? And on top of it being searchable by name?

How about a minimal protection like the search engine eliminating all names from the searchable index, unless, of course, at indexing time they were found to be enclosed in special HTML tags saying "this name should be indexed"? If the information gets unintentionally on the net, most likely the tags won't be there. On the other hand if you create a page that you intentionally want to come up when searching for "Joe Doe", then you enclose the Joe Doe name within the appropriate tags. Google has for example mechanisms to not let you search for credit card numbers (or something resembling them), how about the same protection for names?

Comment Re:Google.eu Homepage (Score 1) 153

So, what do you think should happen if, for example, you're searching for your name and find that the engine provides a link to some (hacked/stolen) database, complete with address, SSN, credit history, credit card numbers, medical records or similar data? Sure, it was the hackers that initially broke the law by stealing and then "making available" that data, but how about the search engine owners responsibility? Since they now provide an easy, direct path to the data, wouldn't it be "aiding and abetting" the public dissemination of such data? Combined with their refusal to remove the link ("we don't have such process"), how would it look like?

Slashdot Top Deals

"The identical is equal to itself, since it is different." -- Franco Spisani

Working...