Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Submission + - New Microsoft iOS and Android Outlook Apps cache your email and credentials (winkelmeyer.com)

An anonymous reader writes: New Microsoft Outlook Apps cache your credentials and *temporarily* store all incoming and outgoing mail. Outside of the obvious corporate security concerns, even for those outside the US, this mean sends and stores all your mail and passwords on US servers even if you are connecting to a private exchange server.

Comment Re:Umm..and telnet is insecure. (Score 1) 375

Qubes handles video playback just fine even at FHD (although within a frame, to show security context).

The MS Office website says Excel requires DirectX "for acceleration". IOW, it runs without acceleration if DirectX hardware is not available. Its not something I really notice, given that Excel mainly deals with text on a grid.

If you really need 3D, Qubes can handle it as long as you supply an additional GPU that behaves well with an IOMMU, such as an Nvidia Quadro. Otherwise, you have to wait for ITL to incorporate GPU virtualization into the Qubes codebase... but virtual GPU tech has only been demonstrated by GPU vendors very recently.

Granted, 3D is an important feature in PCs today, but the inability to /safely/ incorporate it thus far highlights the kind of negligence that has held sway in the computer industry.

You'll have more luck 3D-wise with a Hyper-V server combined with Windows new RemoteFX technology. I know that this is unpopular option, and if anyone can set me straight on hypervisors and 3D for Windows guests not running on Windows hypervisors, please do. I've researched KVM, LXD, Jailhouse, or ESX, and of those, only ESX has experimental Windows 3D guest support.

Most hypervisors are designed for the convenience of users and sysadmins to either run another OS, or better manage server resources... Securing desktop PC features is secondary at best with them.

Submission + - New Snowden Revelation: GCHQ/NSA 'Manipulate, Deceive And Destroy Reputations'

Press2ToContinue writes: Extracted from the recent Snowden cache, Glenn Greenwald at NBC News has posted a GCHQ presentation demonstrating how the NSA incubated a covert "dirty tricks" group known as JTRIG — the Joint Threat Research Intelligence Group. The purpose of JTRIG is to infiltrate groups online and destroys people's reputations — going far beyond terrorist threats to national security.

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums.

NSA and GCHQ were self-described "signals intelligence" agencies, supposedly merely understanding and decoding signals, without taking offensive action. The Snowden docs have now revealed that the mandate of these organizations swings to the offensive, and they actively employ tactics which destroy people's lives to meet their own agendas.

Is this really a power you want to trust — a secretive government agency without any accountable oversight?

Submission + - Source Code Similarities: Experts Unmask 'Regin' Trojan as NSA Tool (spiegel.de)

turkeydance writes: The new analysis provides clear proof that Regin is in fact the cyber-attack platform belonging to the Five Eyes alliance, which includes the US, Britain, Canada, Australia and New Zealand. Neither Kaspersky nor Symantec commented directly on the likely creator of Regin. But there can be little room left for doubt regarding the malware's origin.
link:
http://www.spiegel.de/internat...

Comment Re:FUD (Score 1) 375

Its not FUD when a malware (or bug) with normal privs can open an avenue for physical attack.

If a website/MITM tricks your browser into putting up a tiny context menu, it can allow someone to walk up to your computer later and start messing with it.

Comment Re:Want one, with signature checking (Score 1) 229

But using my signature.

I want secure boot from beginning to desktop, with the knowledge that the NSA has not dicked with my computer beyond its initial state.

They are looking into it... https://groups.google.com/d/ms...

The Qubes OS community is interested in this laptop, but without a TPM chip Qubes' AEM firmware guarding feature won't work on the Librem. So they are looking at accommodating us in another way by employing some kind of user-generated cert to protect the system firmware.

Purism did, however, switch their CPU to an i7-770HQ (along with HM87 chipset) specifically to satisfy Qubes' requirement for I/O virtualization. Pending proper support in Coreboot, Qubes should run and provide great protection from remote exploits on the Librem.

Comment Re:The criticism is fundamentally dishonest. (Score 1) 201

You obviously didn't read the website.

But I get your reasoning... Shiny pocket computers are more important than dealing with servitude.

I don't have to read the whole website to see that all I said was correct.

My hero!!! His Xray vision even works over the Internet.

What is your fucking point anyway? That you are morally superior to me because you have a fair phone - no wait, you said you could get one if you wanted to.

My point (if you read it) is that choices exist out there that the Android market at least makes possible.
 
 

Me, I don't have any shiny pocket computers unlike you hypocrite. Fuck you.

You presume too much, kemosabe... I'm going on 8 years with the same dumb-phone now.

Slashdot Top Deals

Stellar rays prove fibbing never pays. Embezzlement is another matter.

Working...