Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Sideloading is the cause of piracy? (Score 1) 596

The article tries to make the point that side loading is the cause of piracy. That because anyone can search for a pirated game, find it, and easily install it, that this ability to sideload is what makes Android a poor OS from a security perspective. Windows, Mac, Linux, Solaris, BeOS, AIX, HP-UX, and others allow installing applications from "unknown sources" and they are not platforms of evil (take your MS shots here). It is silly that Slashdot even promoted this blog post. The author should address how software gets pirated (same way it does elswhere) - through exploits, hacks, cracks etc. Making it easy to install is not what causes piracy. It is a moral decision by the person doing the pirating. One thing that would help stop it: trial versions or timed versions of software. But don't blame sideloading. This is one thing that makes android development and alternate app stores so much easier on Android then other platforms. Of course the other option for any developer - sell your APK directly, and provide your own serial tied to something on the phone. Some companies do this and it can work. But as always, if someone has physical access to a device, then true security is impossible.

Comment Let him hang (Score -1) 321

I hope the guy gets punished as a traitor. If everyone took his stance that "information should be free" and released what they should be shared, where would be? The next guy may want to level the playing field and share fighter plans, nuke designs, whatever he thinks should be free. No sympathy from me. And Assange is a jerk as well - he thinks he knows best on what to share. - I don't think or govt is perfect by any stretch, but sharing every secret without thought of the consequences is insane. If every Mother-in-Law knew every thought or feeling that another in-law had about her... we would have no one left alive after Thanksgiving dinners. Secrets are made to be secret.
First Person Shooters (Games)

Combat Vets On CoD: Black Ops, Medal of Honor Taliban 93

An anonymous reader writes "Thom 'SSGTRAN' Tran, seen in the Call of Duty: Black Ops live action trailer and in the game as the NVA multiplayer character, gets interviewed and talks about Medal of Honor's Taliban drama. '... to me, it's a non-issue. This is Hollywood. This is entertainment. There has to be a bad guy if there's going to be a good guy. It's that simple. Regardless of whether you call them — "Taliban" or "Op For" — you're looking at the same thing. They're the bad guys.'" Gamasutra published a related story about military simulation games from the perspective of black ops veteran and awesome-name-contest winner Wolfgang Hammersmith. "In his view, all gunfights are a series of ordered and logical decisions; when he explains it to me, I can sense him performing mental math, brain exercise, the kind that appeals to gamers and game designers. Precise skill, calculated reaction. Combat operations and pistolcraft are the man's life's work."
IBM

IBM's Plans For the Cell Processor 124

angry tapir writes "Development around the original Cell processor hasn't stalled, and IBM will continue to develop chips and supply hardware for future gaming consoles, a company executive said. IBM is working with gaming machine vendors including Nintendo and Sony, said Jai Menon, CTO of IBM's Systems and Technology Group, during an interview Thursday. 'We want to stay in the business, we intend to stay in the business,' he said. IBM confirmed in a statement that it continues to manufacture the Cell processor for use by Sony in its PlayStation 3. IBM also will continue to invest in Cell as part of its hybrid and multicore chip strategy, Menon said."
Security

Submission + - Quantum key security 'blinded' by new attack (techworld.com)

An anonymous reader writes: A Norwegian team claims it has come up with a new way to hack quantum key encryption (QKD) systems that would allow an attacker to intercept a key without being detected. An undetectable attack on QKD sounds impossible because the physics that underpin the technology are unshakable. Anyone intercepting the photons used to encode the key in any of QKD's sending protocols between point A and point B will alter their quantum state, making their presence immediately obvious to the receiver.

That is what, in essence, QKD amounts to the detection of the interception of encryption keys with absolute certainty.

According to a newly published paper in Nature Photonics, however, the team at Norwegian University of Science and Technology in Trondheim decided to exploit weakness in the way QKD systems are configured by two vendors, ID Quantique and MagiQ Technologies, to break this apparently watertight assumption.

Security

Two Unpatched Flaws Show Up In Apple iOS 171

Trailrunner7 writes "The technique that the Jailbreakme.com Web site is using to bypass the iPhone's security mechanisms and enable users to run unapproved apps on their phones involves exploiting two separate vulnerabilities. One of the vulnerabilities is a memory-corruption flaw that affects the way that Apple's mobile devices, including the iPad and iPod Touch, display PDFs. The second weakness is a problem in the Apple iOS kernel that gives an attacker higher privileges once his code is on a targeted device, enabling him to break out of the iOS sandbox. The combination of the two vulnerabilities — both of which are unpatched at the moment — gives an attacker the ability to run remote code on the device and evade the security protections on the iPhone, iPad or iPod Touch. The technique became public earlier this week when the Jailbreakme.com site began hosting a set of specially crafted PDF files designed to help users jailbreak their Apple devices and load apps other than the ones approved by Apple and offered in its official App Store."
Cellphones

Cell Phone Interception At Def Con 95

ChrisPaget writes "I'm planning a pretty significant demonstration of GSM insecurity at Defcon next week, where I'll intercept and record cellular calls made by my attendees, live on-stage, no user-input required. As you can imagine, intercepting cellphones is a Very Big Deal in the eyes of the law; this blog post is an attempt to reassure everyone that their privacy is being taken seriously despite the nature of the demo. I'm not just making it up either — the EFF have helped significantly with the details."

Submission + - Fibre optic interface could replace USB (pcpro.co.uk) 1

darien writes: "Intel demonstrated its new "Light Peak" optical interconnect at the second day of IDF in San Francisco. The interface can carry any type of data, and the controller supports a transfer rate of 10 gigabits per second — though since it's based on light the potential for future upgrades is practically infinite. Silicon is promised for next year, though adoption is expected to be slow."

Comment Counterproductive for vendor (Score 1) 250

In EU they decided years ago to block EMEI numbers on stolen handsets - all the carriers participate and handset theft dropped to manageable levels. In the US, AT&T could do it for the iPhone and other phones but they do not... Why - it is not worth the hassle. They don't want the complaints from potential customers that bought an iPhone on eBay. AT&T would rather have the revenue of the new customer then deal with the complaints that someone bought a stolen phone. Why would Amazon behave any differently? They have the potential to sell hundreds of ebooks to the user of the stolen kindle and sell a new device to the victim that lost the original kindle. Amazon wins on all counts. People need to face facts - no vendor really cares. They will not bite the hand of recurring revenue.
It's funny.  Laugh.

Submission + - Dead people on Twitter: A trending problem (cnet.co.uk)

CNETNate writes: "When Jeff Goldblum died, even Jeff Goldblum had to pay his respects on national TV in response to the news trending on Twitter. I'm now in a position where if I see a public figure trending on Twitter, I assume it's probably because they've died and I just missed the memo. Furthermore, the en masse vocalisation of collective idiocy means that my homepage is filled with links to pages full of comments from utter morons. And now, to add to that, I assume it will be these very morons that inform me Eminem has died. Or worse, Jeff Goldblum."
Businesses

Submission + - Piston Powered Nuclear Fusion (technologyreview.com)

katarn writes: General Fusion is a startup proposing they can create commercially viable fusion using acoustic shock waves, triggered by 220 precisely controlled pneumatic pistons. Their approach is based on a US Naval research concept called "Linus" and old research done by General Atomics. They feel we now have the high speed digital processing capable of pulling off the feat, where decades ago the technology was not available. I think we can hold off on the "vaporware" and "scam" tags for a little bit on this one; everyone is aware of the horrible track record for turning fusion concepts into reality, and they don't claim to be the first with the idea or that there are not substantial challenges in the way. If nothing else it is a fascinating concept.
Portables (Apple)

Submission + - iPhone 3rd party services race is on.

Benson Stover writes: As iPhone 3.0 launches tons of companies are scrambling to offer services to aide application developers.

One area that is particularly hot is the mobile analytics realm. Pinch Media is a recent startup which offers iPhone integration which includes support for pulling analytics from Facebook connect users.

With iPhone 3.0 out the new rage is push notifications and Urban Airship recently launched as a 3rd party push notification and in application purchase platform. They are powering push notifications for TapTap Revenge which is one of the first games on the AppStore to include push notifications.

There are also a slew of companies offering a xBox-live like experience for iPhone gamers. Including OpenFeint, ScoreLoop , Agon-Online and Geocade. OpenFient appears to be the marginal leader in this space at the moment, but with ngmoco's announcement this week things might get interesting.

In the iPhone gold rush who will be the preferred picks and shovels vendors?

Comment Re:fail (Score 1) 165

I agree. OP is an idiot.
Another point is that no one should depend on client sided data as the sole means for input validation. That is why Web Servers check input even though JavaScript does it on the web site - clients can't be trusted. The only reason client side validation is done is to save time, and catch some errors early, but the real validation always comes later - for this package it would be the code checking at install time. MS knows Browser headers are spoofed all the time, so they chose not to bother checking them.

Comment Re:Oh please! The Story "Fails". (Score 2, Insightful) 165

I agree 100%. The story sucks. The author gives MS a fail because it would download? The author never installed it and then said the system was F'd up.
Guess what, I can download a Mac binary or DMG from apple to my XP box. Where is the big story on that?
Maybe the next story should be "I downloaded warez and got malware". Give us some more non-news news.

Slashdot Top Deals

"Money is the root of all money." -- the moving finger

Working...