Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:No problem. (Score 4, Interesting) 90

Actually, dropbox only syncs changed blocks of files, and truecrypt volumes use a block cipher, so the entire volume isn't resynced every time, just changes. One caveat, is that you need to turn off truecrypt's default setting to not change the modify timestamp of the file or dropbox won't know that a change was made. So it actually does work pretty well for truecrypt, as long as you are only making changes on one machine at a time.

Comment Re:that doesn't make any sense (Score 3, Interesting) 196

The discs are still dual-layer DVDs, but the new "format" is a different partition scheme that opens up an extra gig of space for game data, at the expense of space that was dedicated for some other purpose. That seems like it should be a pretty minor change, so the rest of the update probably slips in other changes such as DRM.

The theory on why this is requiring a hardware replacement for some users is that this forces a flash of the dvd drive firmware. Some revisions have a dvd drive that is incapable of being flashed, so the firmware may be causing those revisions to be unable to read disks.

Comment Re:"Lied" is a strong word. (Score 1) 265

"Lied" is the correct word, even if it was not done with malicious intent. I am a user of Dropbox, and from the start realized the claim that nobody can access my files without the password was incorrect or at least poorly worded. For one, the client does not appear to store the user's password. Secondly, you can access the files via a web interface and can share files publicly or with other Dropbox users. Lastly, it would be impossible to perform deduplication if each user's data was encrypted separately. Sure, there may be policies and separation of information preventing employees from accessing files, but there has to be a single key in order for that infrastructure to work. The bottom line is, if you are storing sensitive data, make sure it is encrypted locally first. Dropbox synchronizes only changed blocks, so Truecrypt volumes work well. You do have to disable the security feature that prevents the file system from updating the modification timestamp, though.

Comment Re:Most distro's already include unrar don't they? (Score 1) 183

It really depends on the "unrar" that you are comparing it to and how much you care about using open software.

GNA unrar is based off of an old version of RARLAB unrar, and does not support RARv3. It is GPL licensed.

RARLAB unrar, while the source is provided, has restrictions preventing it from being considered "open". One of these restrictions is that it cannot be studied to recreate the RAR compression algorithm.

Since this new implementation is open, the code could be studied to make an open source application to create RAR files, instead of just extract them. This is not allowed with the unrar source.

Note: Some of the above info was sourced from Wikipedia.

Comment Re:Encryption? (Score 1) 250

I did not word it very well. What I meant was that Dropbox only synchronizes changed blocks of a file, instead copying the entire file every time there is a change. Since Truecrypt uses a block cipher (XTS is the mode of operation), Dropbox is able to synchronize changes to the Truecrypt volume very quickly.

Comment Re:Encryption? (Score 1) 250

The files are encrypted, but Dropbox holds the key. This is how you can access the files through the website and share folders directly with other Dropbox users. It means that your files are susceptible to intrusion, so encrypt anything secret yourself before sending to Dropbox. Truecrypt volumes do work in Dropbox because it uses a block cipher(only changed blocks are synced, not the whole volume), but you do need to disable the option to not update modification timestamp in order for syncing to work. KeePass 2.x encrypted databases also work well, unfortunately KeePassX does not support writing to KeePass 2.x databases as of now.

On topic, the headline and summary are blowing this way out of proportion. Dropship fakes the hashing algorithm to make Dropbox think you have a file that you don't. Dropbox already supports both public links for files and folders, and can also privately share folders between accounts. I don't know of any legitimate purpose for Dropship that isn't covered by built-in features.

Comment Re:Just took phone out of my pants pocket. (Score 2) 220

Where would you propose to keep the phone instead? Shirt pocket? If its a choice between an extremely small variation in bone density of my hips or the thing sitting right next to my heart, I think I would pick the hip every time, even if there is no evidence that I've seen that it will affect your heart.

Also, perhaps the reason geeks jump in defensively is because most of these articles sensationalize the issue. As another poster pointed out, on average the BMD of the phone wearing side was 0.3% lower than the non-phone wearing side and the BMC 1.3% lower. This is a minute difference, especially considering that normally you would expect to find a difference between the two sides. "May Rot Your Bones" is vastly overstating the implications of this study.

Comment Re:It was just a matter of time (Score 2) 263

Just because you do not frequently encounter it, doesn't mean it isn't used by others. darkComet is not a trojan. A trojan is something that either installs some sort of malware or is itself some sort of malware under the guise of being a legitimate application. Also, having a secure OS does not prevent a trojan, because the software is installed willingly by the person administering the machine.

darkComet is a normally useful tool, that is being used by a trojan called Blackhole RAT(the actual trojan they should be talking about in this article). There are plenty of trojans and other malware out there using netcat or VNC to control machines remotely, does that mean netcat or VNC are trojans?

Comment Re:TL;DR Version (Score 1) 391

And unless this has been stated otherwise, once they realized they had more data than they intended to capture, they brought it to the attention of the government of each country this happened in. The best analogy I can think of right now is if they were running scans find what frequencies were being used by ham radio operators in what locations and found that they had recorded snippets of conversations. I'm not sure if that is a good analogy though, is it illegal to record from a ham?

Comment Re:It was just a matter of time (Score 1) 263

As much as people want to think otherwise, there is a direct causal link between marketshare and the amount of malware for a given OS.

Can you explain why there are far fewer exploits for Apache and *nix than for IIS and Windows? Linux and UNIX web servers are the vast majority in every marketshare evaluation that I have seen. Being that these servers can contain valuable information about hundreds or thousands of individuals instead of one desktop user, it would seem those should be the bigger target. It is true that Windows has gotten far more secure after they overhauled the code and adopted a similar security model to many *nix distributions, however there is still a huge marketshare of people that have not upgraded to those versions.

Comment Re:TL;DR Version (Score 1) 391

While I agree that this case seems shady and unnecessary, I actually believe the wifi data was most likely gathered by mistake. Sure, it was a big goof, but they threw together a wifi scanner to aid in geolocation that worked by having a wifi adapter in promiscuous mode listen and saved that capture for later analysis and playback to create a database of SSID to location mapping. Only those operating both on an unsecured network and using unencrypted communication (e.g. over ftp or http) had any data collected by the capture. While they should have put more effort into this and filtered the capture to only catch SSID and/or BSSID information instead of actual packets, it was still a relatively harmless issue. Anyone sending sensitive data over open wifi with no encryption might as well setup a radio station and broadcast it (which they are actually doing from a technical standpoint, anyway).

Slashdot Top Deals

There are two ways to write error-free programs; only the third one works.

Working...