Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:Secret Ballot? (Score 1) 480

It's really very easy.

Voter shows ID to election worker. Worker checks the box on the voter rolls. Voter goes into booth and votes.

Both auditable AND secret!

I just don't understand what problem people have with that!

How a check-box from a barely trained, barely paid poll worker constitutes audit-ready data would escape even the most experienced Arthur Andersen associate. Here's a hint: after you get home and you see the results on the news that Candidate ABC got 2 votes and Candidate XYZ got 0 votes (its a tiny town), how would you go about demonstrating that the ballot you cast in support of Candidate XYZ actually pushed the tally higher? OOPS! Audit fail.

Comment Re:Carriers (Score 4, Interesting) 312

Wrong answer. What can the carrier do to block the sending of DDoS, not keep up customers being DDoS'd? Customers participating in DDoS attacks should be disconnected. Anything else is negligence by the carriers. But ISPs make more money leaving them on and defending from attacks, rather than stopping the attacks. It's criminal, and should be treated as such.

If only it were as easy. DDoS attacks come from botnets. Botnets don't come from somewhere, they come from *everywhere*. If they played the "cut off the offenders" game they would need one hell of a huge IP-level blacklist, or they would cut off literally every link they had since compromised hosts are everywhere. If you are going to say "just force the end ISP to disconnect them" then again it's amazingly complicated since an ISP in Georgia (the country) isn't going to listen to some twat in the UK or US complain about a certain group of hosts that are participating in a DDoS, just like ISPs in those countries wouldn't listen to some ahole in Georgia complain about a DDoS host since he might just want to take it offline for political reasons and there isn't nearly enough international cooperation to keep up good relationships between all the concerned parties. Moving up a tier, there is too much good traffic coming from any given ISP to simply write it off as blocking the whole thing.

Comment Re:That's an attack! (Score 1) 139

So now they've opened the door to a new idea, reapplication of Geigers, here's the pitch, are you and your other crime bosses planning something huge and you're worried about leo's using Doppler to break up your plans, buy my LEO-way Geiger counters and know when law enforcement targets your group.

LOLwut. Geiger counters are for alpha, beta, or gamma ionizing radiation (they count how often stray ionizing particles hit the collector). You won't find any ionizing particles when radar-band transmission is used.

You probably meant to say "use an off the shelf car radar detector".

Comment Re:If the government can't defend you... (Score 1) 96

...should you not defend yourself?

Sure. The problem is, in the absence of an impartial referee everyone can submit to without losing face, things tend to get out of hand. You think someone's been unjust to you? Retaliate! Someone might be planning to attack? Attack them first! Someone's getting dangerously powerful? Take them down while you still can!

Just look at world politics: areas with functioning hegemons, even completely impotent ones like the EU, have issues settled through legal battles, while areas without them, like Africa, have an endless supply of militant groups. The hegemon doesn't necessarily have to be a Leviathan, to produce obedience through fear of themselves, they just need to have general recognition as the legitimate ruler so that anyone willing to defect over any particular issue is put back into line by the others for fear of anarchy.

More importantly, the article mentions using "overseas locations" to retaliate. Really all this is (or would be) doing is dirtying the water to make it harder to find out who the real malicious actors are. Better to spend your resources tracing down the exact source, or better yet on public awareness campaigns about malware (since all DDoS "attacks", and a lot of other attacks, come from compromised bystanders). Otherwise, you are just going to push your attackers on to a different group of hosts and will get hit again before too long.

Comment Re:About 10seconds. (Score 1) 97

Yeah, mine's lost half its battery life from that. I'm making the effort to run it on the battery as much as i can now. But the problem with doing that is that when you really need to run off battery, the battery's unlikely to be fully charged. That's a serious flaw in laptop battery systems - and one that there's probably no currently forseeable fix for.

If you really do spend all your time at your desk, get a small, cheap UPS and plug the laptop in to that, and remove the internal battery completely (after running it to about 80% SoC). It will be mostly charged if you should need to pick up and go in a crisis, and you can have it fully charged in about an hours notice.

Comment Re:I have no idea (Score 1) 97

One of the better ways to kill a battery is to keep it plugged in all the time. Take it off the charger once a week and let it run down.

The only way to truly preserve the life of a modern Lithium battery is to get it into a comfortable SoC at around 80%, and then unplug it and keep it in a cool dry place. Draining it just for the sake of giving it some time off the charger is going to at best result in no improvement (if the charger was over-charging it), and at worst result in killing it faster (if the charger had it balanced and you put it through a discharge/charge just for shits and giggles). The charger knows to disengage when the battery is full (at least, for properly functioning laptops) so trying to preserve it any way other than just removing it completely is foolish.

Comment Re:Told you it wasn't North Korea (Score 1) 158

And yet I was called a North Korean and other things for saying what is obvious.

Love the internet. So fuck you all. I was right and you FBI/President believing dumb fucks are wrong, again.

As I said before, the USA owes the NK a big fucking apology.

So some information comes out that it might be someone outside of NK or sponsored by NK (at least based on this little bit of information that isn't really even classifiable as evidence) and you are ready to beat your chest about how right you were? Sounds like you are exactly as right as everyone who said it was NK last week. I would start a slow clap, but...

Comment Re:Security and Performance? (Score 1) 293

Looks like the hotels are claiming this is security and performance related.

Mobile hotspots can be used to “launch an attack against [a hotel] operator’s network or threaten its guests’ privacy” by gaining access to credit card numbers or other personal data, the hotel group said in its petition.

Maybe. If the mobile hotspot is called "Marriot Free Wi-Fi" but is operated by someone collecting information on anyone who connects. Then again, this could happen anywhere. This is why you don't connect to strange wi-fi networks. If you must connect to your hotel's wi-fi network, make sure you're connecting to the right one, not just one with the same name. The solution here is guest education (post signs about which Wi-Fi network to connect to, etc), not running a jammer to block everyone else's Wi-Fi signals.

Multiple outside Wi-Fi hotspots operating in a meeting room or convention center can hurt the performance of a hotel’s Wi-Fi network, the group said.

My off-the-shelf router handles multiple wi-fi networks just fine. I connect to my Wi-Fi and my performance isn't degraded because my neighbors run Wi-Fi networks of their own. A hotel should be able to invest in the infrastructure to provide their own Wi-Fi that will work regardless of whether or not I turn my phone's Wi-Fi hotspot on.

The "security" and "performance" claims are garbage. The real reason is that they want to be able to sell you their Wi-Fi service for a ton of cash and it's hard to do this when you can bring your own Wi-Fi network in with you. As gurps_npc pointed out, if we let them do this, how long until they block all cell phone signals because it interferes with the "security and performance" of their phone system?

Educate? The users? Asking users to only connect to "The REAL Marriott wifi" is all kinds of nuts. You might as well issue them a 802.1x username/password since they are as likely to get all that shit right as they are to tell the difference between "Marriott" and "Marriot" and "Marriott Wifi" (and know which one is legitimate). Your best hope is that you are able to give them a unique WPA2 key that would fail when connecting to anything but the right AP. Even then you have to impress on the importance of actually putting the key in and not just connecting to whatever pops up and doesnt require a key, and since users follow the path of least resistance this option is bound to fail as well. A signed certificate for Wi-Fi SSIDs is hugely overdue, and the fact that we have gone through so many iterations (b, g, a, n, ac) and haven't even taken a crack at it is very disappointing.

While I don't think Marriott, etc should be allowed to do this (since it is clearly in violation of the ISM rules) it's sensible since it was clearly effective (otherwise they wouldn't have lost that judgement).

Comment Re:Also affects Linux - patch now! (Score 2) 115

Okay, not an open port, but if you request a time update wouldn't an attacker be able to respond with a spoofed malicious packet? By sending out a request, the (stateful) firewall will usually allow a response back. I'm not an expert, so I'd be interested to see if someone more knowledgeable could explain that in more detail.

From the description of the bugs, they are related to a server being queried and not related to the expected response. So, only when running ntpd as an internet-facing daemon do you have a problem. It's also a much more convoluted attack to spoof a response from a time server, assuming the attacker hasn't used the vulnerability to take control of the one you happen to be using. Since these vulnerabilities are not in a configuration a reputable time server is likely to use (i.e. the NIST servers) the general public is pretty safe.

Comment Re: Does he stand a chance? (Score 2) 163

They were hardly cavalier with the information. Our own government allowed a contracted network admin total access to everything... now that's being cavalier.

He had a top secret clearance and worked as a system administrator on some of the lowest level pieces of the NSA's infrastructure (backup systems, etc) meaning that for him to do his job they had no choice but to give him at least some possible paths to get at the data. Whether or not he used stolen credentials to facilitate the access that let him download all the documents is a question still open.

Comment Re: Does he stand a chance? (Score 3, Insightful) 163

That provision only covers money made from the information itself, and not the money made from how the information got divulged, nor information about the information.

It's a subtle but significant difference.

That's presuming that Citizen Four is about simply how the leaks took place, and does not mention any of the material in them. Given the completely cavalier attitude adopted by the central figures (Snowden, Poitras, Greenwald, etc) toward sharing the information, I doubt that this is the case.

Comment Bioshock feels oddly prescient (Score 1) 441

His secret — taking human growth hormone (HGH) every day, a special Paleo diet, and a cure for cancer within ten years. "[HGH] helps maintain muscle mass, so you're much less likely to get bone injuries, arthritis," says Thiel. "There's always a worry that it increases your cancer risk but — I'm hopeful that we'll get cancer cured in the next decade [...] a modern nutritional diet designed to emulate, insofar as possible using modern foods, the diet of wild plants and animals eaten by humans during the Paleolithic era. [...] investing in a number of biotechnology companies to extend human lifespans, including Stem CentRx Inc., which uses stem cell technology for cancer therapy. [...] plans to launch a floating sovereign nation in international waters, freeing him and like-minded thinkers to live by libertarian ideals with no welfare, looser building codes, no minimum wage, and few restrictions on weapons.

If anyone played those games and thought "well how could all this batshit stuff all happen in the same place?" now you have your answer.

Comment Re:Sure... (Score 2) 343

From what I've read, the Target crack was funnelled through a 3rd party HVAC company that did not secure their systems sufficiently.
http://krebsonsecurity.com/2014/02/target-hackers-broke-in-via-hvac-company/

They may have done more AFTER the scripts gave them access. But it appears that the scripts gave them the initial access.

Where did it actually say that? They know the credentials given to Fazio were used to access the Target systems as the point of entry, but they don't know how the miscreants came into possession of them. The most likely method was a spear phishing attack that allowed a keylogger on to one of the PCs at Fazio. It's simply too far fetched to think that someone trolling with a script happened across Fazio, then just realized they could use it as a backdoor into Target, and then also be in possession of some very sophisticated malware that, oh gee look, matches the Target POS systems exactly down to the firmware rev number.

Comment Re:Sure... (Score 5, Informative) 343

He is phrasing it incorrectly. The attacks are scripted and BLIND. They don't attack X and skip Y if X is vulnerable. Or attack Y if X is not vulnerable. They attack A - Z regardless of the success or failure of any single attack.

That's not entirely true. It's not clear how many other targets the miscreants who hit Home Depot, Target, etc had, but they did a lot more than scripted attacks (they used social reconnaissance, then spear phishing, then multiple point-of-entry probes, for starters) in order to get inside, and once inside they put a hell of a lot of work into pulling off their attack, and mixed that with a ton of luck in order to actually succeed. The Target hack actually would have been dead from the start if Target trusted their FireEye consultants who tried to warn them of the impending data theft.

Comment Uh Oh (Score 1) 118

"Alert Logic warned that Grinch could be as severe as the Shellshock flaw that roiled the Internet in September"

While a big deal, Shellshock was very limited in scope and the large scale exploit implications were stamped out very quickly through updates to vulnerable web front-ends (which was just about the only exploitable path, despite so many proclamations that the sky was falling and every internet-connected linux device will get rooted in a matter of days). If this is as severe as Shellshock, I will take notice but at the same time sigh that it's not going to be very bad at all.

Slashdot Top Deals

The optimum committee has no members. -- Norman Augustine

Working...