Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Opportunistic encryption (Score 1) 601

Ultimately decisions about email encryption come down to what threats you think you might be protecting yourself against. I have a PGP key, and on occasion I use it to sign and decrypt emails when I think it matters. The rest of the time I send mail, over SSL, through my own mail server, which will use SMTP's 'startTLS' command whenever possible. Most people I know read their mail either using SSH on the machine that runs the mail server or over some SSL-protected IMAP or webmail interface. Thus, for most cases, the mail is encrypted in transit but never encrypted on the servers. If the threat is one of people eavesdropping then this keeps me safe; if the threat is one of hackers targeting one of the mail servers then it doesn't. Most of my mail doesn't warrant any more effort to achieve any more security.

Comment DreamPlug (Score 2) 334

While it's a bit more targeted at the "server" market rather than "router" market, the DreamPlug does all that you want. It has dual gigabit ethernet, 802.11 b/g/n, a 1.2GHz ARM processor (with a decent crypto co-processor that can handle full duplex gigabit VPN encryption), USB2 and eSATA ports for adding discs, an external SD card port and 4GB of flash inside for the FS. It even has both analogue and SP/DIF audio out in case you want to stream music into your server cupboard. It's very low power too (typically about 10 watts).

Comment What's the threat model? (Score 1) 125

When you're building any sort of security system the very first thing you need to do is decide what your threat model is. Then when you think about a solution you need to assess it against that model to see how it performs. If the threat here is kidnapping, the solution is useless since the bad guys will remove the tag. This solution is only ever going to help against "wandering" kids, but if the teachers think that the kids can't wander off then they are likely to pay less attention, which is means the kids will be at greater risk of injury from all sort of other things that the teachers would have spotted. The system almost certainly puts kids at greater risk than before.

Comment Prince Philip has cryptography connections (Score 3, Interesting) 132

I had the pleasure of meeting HRH the Duke of Edinburgh at an event once and, upon hearing that I worked in cryptography, he told me about his time working signals in the British navy during the second world war. He said he had always been fascinated by the operation of the British TypeX equipment that he used back then. I don't suppose that he did any code breaking but he certainly was using codes well before the Cypherpunks came along.

Comment Not wanting to start a GLP flame war but... (Score 2) 146

... while the code for Android is GPLv2, the move of various other projects towards GPLv3 is only going to make this sort of problem worse. The 'anti-Tivoisation' clause basically demands that some authorised signing key gets distributed with any GPLv3 code that needs to be signed in order to run, and that the available signing key grants all the rights necessary for that code to function. While it is of course possible for users to completely rebuild the trust hierarchy with their own keys, very few people will be willing to do so. As a result it seems likely that any GPLv3 project will be unable to make effective use of signing as a mechanism for preventing the execution of rogue code, even if the license allows for it in theory.

Comment Re:Allies were the villians in WWII (Score 3, Informative) 139

Sadly, while the poster is clearly trolling with his deliberately lopsided history, the US did put well over 100,000 Japanese Americans into internment camps. These camps, while offering better conditions in most respects, bore far too close a resemblance to concentration camps for anyone with a conscience. look it up is you need to know more.

Comment Copyrights on facts (Score 4, Informative) 247

I've hear it suggested by a number of lawyers that the _specification_ a binary interface of a library is a statement of fact, rather than a creative work. Since copyright does not apply to statements of fact this would suggest that structure definitions and the like would not be subject to copyright, and by extension the is no issue regarding derivative works. Of course you could probably as the same lawyers on a different day (or with a different person paying the bills) and get a different answer, but the concept seems to make sense.

Comment It's just a UIWebView issue (Score 2) 298

So the real story here is "iOS Safari has got lots better in 4.3 and iOS web apps run just like they used to." Doesn't exactly sound like Apple adding handcuffs to me. Sadly that didn't make a good enough headline for The Register and anyway El Reg loves a conspiracy theory.

The fact is that this is almost certainly just a versioning issue with the UIWebView code. When you launch a Web App in iOS what actually happens is that it a launches a dummy app that just consists of a full screen UIWebView pointed at the web page. Other than when Apple releases new full version (e.g. x.0 release) the UIWebView code has typically trailed the code in Safari by at least one point release. This "bug" quite possibly "won't be fixed" as a bug because it will just come out in the wash. If there is ever an iOS 4.4 I'd expect to see it resolved there, otherwise I'll put money on it being fixed in iOS 5.0 come the summer. Apple aren't going to put up with on-going maintenance of diverging WebKit code bases just to make sure that Objective-C applications stay running even faster than JavaScript than they would with Nitro.

Comment Is this really a new browser? (Score 1) 48

Watching the video I'm wondering if this is really a new browser concept or is this is just a set of well-designed widgets neatly placed around the borders of the same of browser technology we've had for years? I don't see anything that could not be done using Firefox plug-ins or Safari extensions. I'm not saying that what they have isn't useful to people who live their lives on the Social Network, I just don't see how this idea warrants backing as a venture-capital funded start-up. How long will it be before there are half a dozen implementations of all their good ideas as plug-ins for the browsers we already use?

Slashdot Top Deals

It's a naive, domestic operating system without any breeding, but I think you'll be amused by its presumption.

Working...