Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:who tha fu.. (Score 1) 487

The 'feature' occurred on Windows Phone first, not sure exactly what version. I assume that it made a great pitch to prospective carriers, since they all love offloading customers onto anything that isn't their data network as often as possible, and typing passwords into your phone is a pain, so automating it likely increases network offload considerably.

Comment Re:No (Score 2) 487

Just as they say, in the context of backups, that 'if it isn't automated it won't happen'; there is likely to be a considerable difference in the rate of unintended leakage between a 'yeah, I guess I did tell Bob the password, he could pass it on' and 'the password spreads through your entire social group like a bad chain email'.

This sort of 'friend/acquaintance' attack attack is also exactly where slightly-too-automatic automation makes it really easy to bypass what limited good sense about security humans do have.

If, say, Alice and Bob have just had a messy breakup; it would be fairly obvious to any mutual friend of the two that sharing one's wifi password with the other, or a known friend/agent of the other, is something that they wouldn't like. They might do it anyway; because people are assholes like that sometimes; but it would be deliberate. Social-engineering somebody in that situation into telling you the password might be vaguely tricky. Social-engineering them into making you enough of a contact/friend/whatever on the services that this 'wifi sense' system uses to receive the password should be absolutely trivial; quite possibly already done.

I suspect that it isn't for nothing that this 'feature' first appeared on Windows Phone; carriers adore the idea of getting the filthy customers off the cell data networks they pay for and onto wifi as often as they can, and don't much care about a bit of collateral damage inflicted by dumb implementations.

Comment Re:if that's true, (Score 4, Interesting) 487

What I would like to see explained in more detail is the claim that 'wifi sense doesn't reveal your plaintext password' during the sharing process.

My understanding was that(except WPA2 with RADIUS and a suitably chosen EAP) there isn't any provision for authenticating to a password protected AP without knowing the password. The AP itself might be able to destroy the password after it has been set, saving only a hash, as is good practice to keep more important sets of usernames and passwords from being compromised; but the client requesting authentication needs the password. The non 'enterprise' cases were designed to be easy to use, not particularly clever; and MS has limited room to get creative without causing nasty breakage on large numbers of variously dysfunctional legacy APs.

With a proper full WPA2 setup, or with one of the 'no authentication at the AP; but captive portal and/or VPN is the only way to access anything interesting' arrangements, you have more options; but how can you 'share' authentication to a WPA-PSK or WEP network without also sharing the key? Did they actually come up with something really clever, or does the UI just not show you the password, thus 'hiding' it?

Comment Re:Antropologist (Score 4, Insightful) 128

Someone unqualified to access the safety of nuclear power plants declares them unsafe.

Did you bother to even skim the article? It was essentially entirely focused on human and organizational risk factors, the sort of thing that anthropologists do actually study, in US nuclear facilities and preferred methods of securing them.

If the concern is "will the roof resist a hardware-store-improv mortar attack?", sure you don't want an anthropologist on the job. If the concern is "so, will the guards notice, give a damn, and do something about it; or will I just have to walk past a token force optimized for cheating its way to passing grades during perfunctory audits at lowest possible cost?", that's an anthropological question. And the answer appears to tend toward the latter.

Submission + - Why Isn't Anyone Talking About the Botched Apple Music Launch?

itwbennett writes: When Apple Music launched yesterday, it only launched on iOS apps at the appointed time. Peter Smith writes this about the desktop experience:

The Apple Music site had a Try Now button up for desktop users all day, and clicking it opened iTunes. iTunes 2.1.2 if you were up to date. The problem was that Apple Music requires iTunes 2.2, and as late as 6 PM ET that wasn't available. If you clicked the Try Now button, iTunes would open and inform you that you needed iTunes 2.2 and offered an Upgrade button. That Upgrade button would take you to the web to download the old version of iTunes that didn't support Apple Music.

But nowhere in the tech press did you see mention of the botched launch. VentureBeat wanted to make sure you knew how not to get charged for Apple Music, as did Engadget and TheVerge. And TechCrunch thought things were "going pretty well so far" when, at 6:20 PM ET, some Mac users finally started getting the update ( seven hours after scheduled launch).

Submission + - Hundreds of Dark Web mirror sites 'booby-trapping' Tor users (thestack.com)

An anonymous reader writes: Tor users are being warned about hundreds of fake and booby-trapped .onion websites after the founder of Dark Web search engine ahmia.fi noticed a clone of his own site online. Juha Nurmi, who operates an open source .onion search engine, found over two hundred fake replicas of Dark Web pages, including the popular Tor version of DuckDuckGo. In a Tor-Talk post [https://lists.torproject.org/pipermail/tor-talk/2015-June/038295.html] he suggests that there are several copies of the targeted websites, each with similar addresses. Unlike on the traditional World Wide Web, unindexed Tor pages are typically located through directories rather than across search engines and often have complicated URLs – thus making it easier for fake addresses to go unnoticed. Nurmi added that the fake sites are working as transparent proxies to the real pages, allowing hackers to launch attacks against their targets.
 

The Almighty Buck

Scientist Union's Talks Stall Over Pay 80

HughPickens.com writes: The Sacramento Bee reports that the labor contract between California's state government and the 2,800 employees represented by the California Association of Professional Scientists expired this week, spotlighting yet again the long-running feud over whether the tiny union's members should earn as much as their peers in federal and local governments and private industry. "It's a challenge to keep people motivated," says Rita Hypnarowski. "We talk about retaining the best and the brightest, but I can see that's not going to happen." A recent survey by the Brown administration found that the total compensation for half of state-employed chemists is less than $8,985 per month ($5,715 in salary, plus $3,270 in benefit costs). That's 33 percent less than the median total compensation for federal chemists, nearly 13 percent less than the midpoint for local-government chemists and almost 6 percent below the private sector.

Members of the union perform a wide variety of tasks, everything from fighting food-borne illnesses to mopping up the Refugio State Beach oil spill. For example, Cassandra McQuaid left a job last year at the Department of Public Health's state-of-the-art Richmond laboratories where she tracked foodborne illnesses. It's the kind of vital, behind-the-scenes work that goes unnoticed until an E. coli outbreak makes headlines and local health officials need a crack team of scientists to unravel how it happened. "It really came down to money," says McQuaid. "I just couldn't live in the Bay Area on a state salary."
Operating Systems

People Are Obtaining Windows 7 Licenses For the Free Windows 10 Upgrade 172

jones_supa writes: Windows 7 has quickly started increasing its market share of desktop operating systems, nearing 61%. If you're wondering why this is happening when Windows 10 is almost here, the reason is this: Windows 10 will be available as a free upgrade for those running Windows 7 and 8, and the new OS will have the exact same hardware requirements as its predecessor, so the majority of PCs should be able to run it just as well. Because Windows 7 was launched in 2009, a license is more affordable than for Windows 8, so many users are switching to this version to take advantage of the Windows 10 free upgrade offer.
Verizon

How Verizon Is Hindering NYC's Internet Service 123

Cuillere writes: Verizon promised to make FiOS available to all New York City residents. The deadline passed a year ago, and many residents still don't have FiOS as an option, but Verizon claims to have done its part. "The agreement required Verizon to 'pass' homes with fiber (not actually connect them), but no one wrote down in the agreement what they thought 'pass' meant. (Verizon’s interpretation, predictably, is that it doesn’t have to get very close.)" The situation is a mess, and the city isn't having much luck fighting it in the courts. Susan Crawford offers a solution: set up wholesale fiber access for third party ISPs and absolve Verizon of customer service responsibility.

Submission + - China's new security law seeks to make cyberspace more 'controllable' (thestack.com)

An anonymous reader writes: China has today passed a new security legislation which looks to extend governmental powers over cyberspace, in reaction to what it referred to as a growing threat towards Chinese systems. According to a text released in Beijing today [http://www.npc.gov.cn/npc/xinwen/lfgz/flca/2015-05/06/content_1935766.htm], the new National Security Law seeks to “safeguard national security, defend the people’s democratic dictatorship and the socialist system with Chinese characteristics.” Regarding the country’s cyberspace, the bill looks to reinforce federal control over the country’s networks and calls for tougher mechanisms to deal with cyberattacks, theft of national secrets as well as the diffusion of any illegal or offensive materials. It requires that all critical state infrastructure and information must be kept “secure and controllable” to be able to protect Chinese cyber sovereignty. China has said repeatedly that it faces a constant onslaught of hacking attempts. The ruling Communist Party puts great effort into monitoring potentially harmful content online and blocks any webpage it deems illegal.

Comment Re:A lot of the online gambling industry is locate (Score 0, Flamebait) 60

Surely the proposal will be scuttled when the realize that driving the gambling operations out of the province will sharply reduce the number of them that give due prominence to French language text; and acknowledge the right of the people to lose money without brutalizing exposure to anglicisms.
Canada

Quebec Government May Force ISPs To Block Gambling Websites 60

New submitter ottawan- writes: In order to drive more customers to their own online gambling website, the Quebec government and Loto-Quebec (the provincial organization in charge of gaming and lotteries) are thinking about forcing the province's ISPs to block all other online gambling websites. The list of websites to be blocked will be maintained by Loto-Quebec, and the government believes that the blocking will increase government revenue by up to $27 million (CAD) per year.

Comment Re:It's not designed to dogfight. Lowest priority. (Score 2) 843

Technically the gun 'works'; but the vendor is too half-assed to actually provide drivers for the gun until some later revision, for which we will presumably pay more.

Optimists prefer to focus on the fact that, in order to preserve the oh-so-sexy-low-radar-signature design, the system only holds 200 rounds, so nobody expects much of it even when the pilot is able to use it.

Slashdot Top Deals

"If I do not want others to quote me, I do not speak." -- Phil Wayne

Working...