Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re: It's time for Facebook to pull out of France. (Score 1) 145

It's the EU. The non tracking comes from a court in Belgium (and it's good practice to stop doing it in the whole EU, because it's obviously in compatible in concept with the old and new privacy directives, it's just the first country what a court has ruled).

French consumers can sue any EU company at home.

Furthermore you have the issue that a number of EU countries are critical to popular tax dodges.

Comment Re: Isn't 30 years a little excessive? (Score 1) 118

One important detail. This gut is not a spammer. He's a scammer. For this kind of attack to work you need very targeted emails tailored to the recipient. (I'm having problems calling the receiver victims. you do not need encryption to protect yourself just a working brain. I get a crazy email from my boss, the first thing that happens is that I need clarification, and surprise surprise is obvious that one asks via a different channel for clarification.)

Comment Re:Coding style vs 'problem solving style' (Score 1) 164

Yes and no. The better people in the industry continue to learn, every day.

Actually, my current team lead expects us to learn all the time, and is completely willing to take the hit in longer ticket handling times.
OTOH, my current boss is an outlier in my experience in this industry.

Comment Not so fast (Score 1) 164

Important part:

        Finally, we do not consider executable binaries that are obfuscated
        to hinder reverse engineering. While simple systems,
        such as packers [2] or encryption stubs that merely restore the
        original executable binary into memory during execution may
        be analyzed by simply recovering the unpacked or decrypted
        executable binary from memory, more complex approaches are
        becoming increasingly commonplace, particularly in malware.

So, there are numerous issues here:

1.) getting the samples for training (e.g. the authors already mention this as a problem) => github and friends distribute source code, and it's not necessarily trivial to get the compiler and options right to recreate the correct binary.

2.) If you would for example profile me online, you'd learn from code repositories that I know python, and you might from post interfere that I know other languages. My Python repositories will not help you identify my binaries build in C.

3.) And worst, the code where this deanonymization would be most useful, e.g. malware, is very hard to handle, as it's usually obfuscated to the max. Worse malware has been known to mutate itself on replication to avoid leaving a signature for virus scanners.

Anyway, nice ML paper. ;)

Slashdot Top Deals

You are in a maze of little twisting passages, all alike.

Working...