Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:Nope [Weak use of Betteridge leading to none] (Score 1) 76

Most people are a mix of both. I'm more clear cut. Hanging out with general people saps me of energy. Going out to the bar to hang with friends that like to be at the bar can leave me feeling drained of energy for days, a mental fog, and make sleeping difficult. Hanging out with a small group of people with whom I can geek-out can give me a strait up adrenaline rush, leave me energized for days, and make sleeping easy. I enjoy both situations, but can only handle so much of each. In controlled amounts extroverted hangouts mellows me out which can be great for certain types of stress. Too much energizing from geeking out can be a burn out. I really need both in balance.

I spend most of my time home with my wife. She's more in-between than I am but still more introverted. She loves going out but can only handle it a few days in a row before she's hit her limit and is good for a few weeks. She's my bridge to sometimes getting out. On my own I'd never hang out. It works out well. I can kind of live "through her" in a way. Seeing her having fun with our friends makes me feel good while allowing me to selectively interact. I tend to geek out, so I'm generally quiet until a topic arises that interests me.

For work I've reached an interesting tipping point. I've learned to apply my introspecitive skills to other people. This has allowed me to be proactively empathetic to hedge off issues both technical and human interactive in nature. For this reason I have been promoted several times and spend the vast majority of my time mentoring, capturing system and process improvements, and getting involved with inter-team issues. I've reached the point where I've analyzed my own thoughts and feelings to figure out that people feel and think like me, just with different weights and priorities.

Comment Re:I'm shocked! (Score 1) 50

Local ISP sells dedicated bandwidth. If you have any performance issues in their network, to their transit network, or through their transit networks, they will get it fixed. They pay for guaranteed bandwidth in their transit networks. I was paying $90 for 100/100, they they started to alter the tiers and dropped it down to $40 for 150/150 with a 6month half-price intro. For 6 months I was paying $20/m for 150/150, then it went up to $40. I could get that 150/150 to nearly everywhere in the world that I cared, and even decent performance to more poorly connected places like India, Africa, New Zealand, parts of Australia.

And when I say "guaranteed bandwidth in their transit networks", I mean it. Their routes continued to work during BGP outages. Even with national outages and routing problems from those Tier 1 providers, our connections still worked and remained low latency and high bandwidth. There was once a time where some major fiber was cut causing performance degradation for that Tier 1. Even during that time, our route was altered resulting in slightly higher latency, but bandwidth was still spot on even while other customers of that Tier 1 where reporting performance issues over the same route.

I have 400Mb symmetrical fiber these days and get my provisioned speed pretty much everywhere. It's been a while, but at one time I did a month long high ping of 10 pps to an arbitrary datacenter in Europe. Max-Min was less than 10ms, std-dev of jitter was 0.1ms, and fewer than 200 packets lost. At one time AWS Paris was "3 hops" from Midwest USA for me.

Now days their tiers are like this. $50 250/250, $80 400/400, $120 600/600, $180 1Gb/1Gb. No installation cost, no contracts, no fees of any kind, no tax. You at-most pay exactly what is advertised. I can't go back to Charter.

The cherry on top. They have anti-bufferbloat. I can literally saturate the connection up and down at the same time with BitTorrent and none of my other connections are affected by loss, latency, or jitter. The only way I ever got the latency to go up was when I used a DDOS testing tool and had it send 1Gb/s at my 100Mb connection and it caused my latency to my first hop to go from 0.014ms to 18-20ms with ~90% loss. But even at a DDOS of 110Mb/s and my router claiming exactly 100Mb/s of ingress, I still had sub-1ms latency and 0 loss. Statistical flow isolation. They seem to have similar tech in use on their trunks as well. I had to report an issue about reduced bandwidth but unaffected ping and loss. Turned out they had an active DDOS attack against them sending several times their trunk bandwidth and their alarms didn't go off because they monitored latency and loss, which were unaffected. Even with a volumetric DDOS against the ISP, I could still play video games unaffected. The only issue I was having was 4k videos took a few seconds to start. I was used to instant buffering.

Comment Re:Local capacity (Score 1) 298

Fast chargers don't even need sustained full rates to be useful. Some places like restaurants and shopping centers are starting to install chargers. The average USA person only needs to travel about 50 miles a day. This is only about 10 minutes on a fast charger. If we have enough chargers at enough general locations, people can top off whenever they drop 10-20% below their target. When they go shopping or out to eat, they just park in a charging spot, hook up, go about their business and come back to enough extra charge.

At no point do they need to plan to go somewhere to charge. Actually stopping at a place dedicated to a full fast charge will be for people traveling.

Comment Re:Absolutely Fuck No (Score 1) 106

The /. summary is missing some key information. /pun This process is done only using the attestation API. The fingerprint of your private device is not sent, only the batch key. In the case of yubico, a batch is 100,000 keys in size. Your identifier will be shared with 100,000 other devices. Couples with your IP location, I'm sure they can track you quite well, but there are plenty of other ways to track a person. Anti-tracking addons are a great way to track someone. The irony.

Comment Re:It's an ouroboros of terrible ideas (Score 1) 106

Now that I got to sleep on it, I realized a few things.

1. If you can automate touch, you can also reset the key and make a identifier
2. You can just place it on an NFC reader. The key assumes physical interaction with NFC.

The only saving grace is probably how slow these are. Compared to a fully software setup, the only way to scale up is purchasing more keys.

Comment Re:It's an ouroboros of terrible ideas (Score 1) 106

Can I leave the device in a USB slot?

Yes. I leave my yubikey nano in 24/7. Used to decrypt my harddrive and passwordless login to my computer.

Then what's keeping me in the same room as I send these "human" requests?

They require physical interaction with the hardware device. Do you even know what a yubikey is?

A hardware device, which can get lost, stolen, or just plain broken

I have it on my keychain, I can't get into my house or car if lost of stolen. Very difficult to break. Why you have a backup. I don't think you noticed that they're talking about using this as a CAPTCHA replacement, not actual authentication. They're effective abusing the fact that this form of authentication cannot be automated or faked. They don't care about anything other than the response is signed by a manufacturer that has proper security keys that can't be easily hacked.

FIDO security keys are essentially PGP or SSH for authentication. When you use the device for the first time or reset the device, a randomly generated public private key pair is created. When you register with a new service, the device sends the public key. When you try to login, the service will send a nonce that gets signed with the private key on your device and the service compares the signature with the original public key that is registered.

Beyond this is that manufacturers can sign your keys. Because your keys are create at the time that you use the device for the first time or reset the device to create a new private key, the manufacturer has to place a signing key on the device that will sign your key. The manufacturer will sign this signing key with their root key. Cloudflare can get the public version of this root key and make sure that your device's key is also rooted back to that key. In this way they can validate that you aren't using just any device, but a device from a trusted manufacturer.

In Cloudflare's case they don't actually care what device you're actually using, just that you're using a device from a trusted manufacturer that makes sure their devices require physical interaction and cannot be easily automated. To boil this down. Cloudflare found an interesting use for any existing authentication process in order to break automation by being able to easily know a human is behind the request. That is all. But yes, a unique identifier is communicated and could be tracked.

Comment Re:Fido2 is not tied to hardware (Score 1) 106

Good luck getting yubico's private key to sign those. You missed the attestation part. Each yubikey contains a private key that is signed by yubico back at the factory, and this key signed your randomly generated key. Since you can't access any of the keys on the device, yubico's private key won't get leaked, and your random private key can be signed by yubico without them ever having access to your secret.

Cloudflare is saying that will will check the signature of your key to make sure that it is from a company that properly locks down their keys. Any other FIDO2 device will not work. The only way past this is to buy a bunch of yubikeys or of the other brands that they've allowed.

Slashdot Top Deals

We have a equal opportunity Calculus class -- it's fully integrated.

Working...