Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Drama queen (Score 1) 196

Signing doesn't change in any way whether AdBlock Plus can be blocked or not. We get complaints about it on occasion and it's still hosted on the official add-ons site.

Its not the same thing, and I'd hope you would have the sense to realize that.

Blacklisting an addon requires an action on the part of Mozilla. But now with the way the signing requirement appears to be implemented, the use of new or unusual addons can be stopped by simple neglect on Mozilla's part... LACK OF AN ACTION will now block addons!

And even that would be OK with me if you gave the user some way to click some extra buttons or context menus to make an exception as is done in Windows and OS X.

But no..... lets be inspired by iPhones and iPads.

Comment Re:Drama queen (Score 1) 196

I'm in favor of signing as a way to protect against MITM attacks when installing or updating addons. And I think Mozilla curating its own AMO site is a good thing. These two practices, implemented together flexibly, would be a boon a Firefox users if Mozilla had the sense to arrive that decision.

However, the way you're implementing this is cutting across PC culture by giving the user no recourse. That is a big mistake. Whether you intend it or not, a de-facto walled garden is still a walled garden.

Neither Windows nor OS X completely tie the users' hands when encountering un-signed programs, and there are good reasons for this.

Comment Developers like a solid platform (Score 1) 140

...that makes neat features accessible to both developers and users.

And by "solid platform", I mean something that demonstrates a consistent philosophy and design from the UI and APIs down through the kernel and the hardware.

There should also be a specification (like Multi-Media PC was for Microsoft in the 90s) of what a minimum hardware configuration should look like for a given platform (mobile, desktop, etc) to support most of the apps users will find enticing.

If you build a consistent, feature-stable platform with neat features the app developers will come. Maybe not in droves, but you will start seeing some very interesting new ideas and apps written by the sort of people who do NOT like to tinker with kernel options in grub.cfg or have to dig through /etc with a text editor to get things working.

Tim Berners Lee wrote the first web browser on the NeXT platform which had a tiny user base. Now Ubuntu is trying to compete with iOS, which is the progeny of NeXT.

Submission + - New Microsoft iOS and Android Outlook Apps cache your email and credentials (winkelmeyer.com)

An anonymous reader writes: New Microsoft Outlook Apps cache your credentials and *temporarily* store all incoming and outgoing mail. Outside of the obvious corporate security concerns, even for those outside the US, this mean sends and stores all your mail and passwords on US servers even if you are connecting to a private exchange server.

Comment Re:Umm..and telnet is insecure. (Score 1) 375

Qubes handles video playback just fine even at FHD (although within a frame, to show security context).

The MS Office website says Excel requires DirectX "for acceleration". IOW, it runs without acceleration if DirectX hardware is not available. Its not something I really notice, given that Excel mainly deals with text on a grid.

If you really need 3D, Qubes can handle it as long as you supply an additional GPU that behaves well with an IOMMU, such as an Nvidia Quadro. Otherwise, you have to wait for ITL to incorporate GPU virtualization into the Qubes codebase... but virtual GPU tech has only been demonstrated by GPU vendors very recently.

Granted, 3D is an important feature in PCs today, but the inability to /safely/ incorporate it thus far highlights the kind of negligence that has held sway in the computer industry.

You'll have more luck 3D-wise with a Hyper-V server combined with Windows new RemoteFX technology. I know that this is unpopular option, and if anyone can set me straight on hypervisors and 3D for Windows guests not running on Windows hypervisors, please do. I've researched KVM, LXD, Jailhouse, or ESX, and of those, only ESX has experimental Windows 3D guest support.

Most hypervisors are designed for the convenience of users and sysadmins to either run another OS, or better manage server resources... Securing desktop PC features is secondary at best with them.

Submission + - New Snowden Revelation: GCHQ/NSA 'Manipulate, Deceive And Destroy Reputations'

Press2ToContinue writes: Extracted from the recent Snowden cache, Glenn Greenwald at NBC News has posted a GCHQ presentation demonstrating how the NSA incubated a covert "dirty tricks" group known as JTRIG — the Joint Threat Research Intelligence Group. The purpose of JTRIG is to infiltrate groups online and destroys people's reputations — going far beyond terrorist threats to national security.

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums.

NSA and GCHQ were self-described "signals intelligence" agencies, supposedly merely understanding and decoding signals, without taking offensive action. The Snowden docs have now revealed that the mandate of these organizations swings to the offensive, and they actively employ tactics which destroy people's lives to meet their own agendas.

Is this really a power you want to trust — a secretive government agency without any accountable oversight?

Submission + - Source Code Similarities: Experts Unmask 'Regin' Trojan as NSA Tool (spiegel.de)

turkeydance writes: The new analysis provides clear proof that Regin is in fact the cyber-attack platform belonging to the Five Eyes alliance, which includes the US, Britain, Canada, Australia and New Zealand. Neither Kaspersky nor Symantec commented directly on the likely creator of Regin. But there can be little room left for doubt regarding the malware's origin.
link:
http://www.spiegel.de/internat...

Comment Re:FUD (Score 1) 375

Its not FUD when a malware (or bug) with normal privs can open an avenue for physical attack.

If a website/MITM tricks your browser into putting up a tiny context menu, it can allow someone to walk up to your computer later and start messing with it.

Comment Re:Want one, with signature checking (Score 1) 229

But using my signature.

I want secure boot from beginning to desktop, with the knowledge that the NSA has not dicked with my computer beyond its initial state.

They are looking into it... https://groups.google.com/d/ms...

The Qubes OS community is interested in this laptop, but without a TPM chip Qubes' AEM firmware guarding feature won't work on the Librem. So they are looking at accommodating us in another way by employing some kind of user-generated cert to protect the system firmware.

Purism did, however, switch their CPU to an i7-770HQ (along with HM87 chipset) specifically to satisfy Qubes' requirement for I/O virtualization. Pending proper support in Coreboot, Qubes should run and provide great protection from remote exploits on the Librem.

Slashdot Top Deals

The hardest part of climbing the ladder of success is getting through the crowd at the bottom.

Working...