Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Senators Demand... (Score 1) 148

OMG,
"Senators Demand CIA Director Admit He Lied About Spying On Senate Computers"

What if the senator is demanding the CIA director lie?

If he did lie make a case and charge him.

The senators should simply demand honesty.

However N.B. the senate and congress passed laws with little audit and oversight.
Some senators may in point of fact be legitimate targets of investigations one,
two, three, four degrees of Bacon connection.

OBTW the spying might have been to track back international criminals that had
illegally compromises Senate computers.

This proves that it is turtles all the way down.

Comment The right answer is ... (Score 1) 509

The right answer is: "Yes sir".

"yes sir" and back away.

Keep the recording live but not pointed at anything as long as possible to record the illegal request
to stop recording civic actions in a public place.

Should you feel a need to answer why... one answer might be "to protect the innocent
like you officer."

Comment Re:Depends how you evaluate the curve (Score 1) 425

If you're looking for people who generate a profit from their time, the curve is almost certainly......

The shape of the curve has statistical value and analysis value but most companies are too small
to care about the curve. They are saddled with finding the necessary skill set and also stay
within budget. Some suffer sticker shock.

In my limited lifetime the best model for programmers is book authors.

A programmer must communicate with clarity to the machine and with
management. So as a minimum two context sensitive language constructs
must be mastered.

Skills and details can be learned but the set of necessary detailed skills is moving so fast that
a hiring manager has no clue anymore. When I first put a deck of cards on the in window
for the new 1401 I had a short list of languages to work in. Today I need wc to count them and
all the ways they can be cross linked. N! comes to mind and as the number of coding methods
expands to embrace more languages and vastly more libraries the ability to find a match
becomes astonishingly small.

One might see a list of words unique to one university recolored by the language of the
last programming team. This is seen in patent applications where an examiner has no
encyclopedic knowledge that allows him to see that this is the same as ______.

I have suffered through at least four iterations of RAID technology and tools.
They all had the same underlying "stuff" but the language and tool names
made them incomparable without a magic decoder ring.

The authorship thing is interesting... A look at the NYT best seller list and there
is not enough data to describe the curve. Amazon might have a modern data set
that can describe this but they may not have more than noise.

Good authors of books and programs are simply uncommon.
Editors reviewers and typesetters much more common.

Comment Re:this already exists (Score 1) 288

Which opens you up to all kinds of high circumstantial evidence prosecution. ........

But of interesting value for ANY business or ANY consultant or ANY person or any government employee
that might have valuable data on hardware that might get lost or stolen.

A person might have bank records
A consultant might have trade secret or confidential NDA informatio ....data has value or liability....

Since the presence or absence of such a device in a corporate or government context is a strong
signal that the device is interesting or not I can see ALL portable systems get outfitted with such
a device+software. With modern encryption there may be little need for the exit(SmokeAndFire) of
mission impossible but that is possible.

Comment Tip of what sunk the Titanic (Score 1) 1

This may be the tip of what sunk the Titanic.
It is darn difficult to place an auditing proxy service or other auditing resource
between a cell phone and the globe.

Worse the connections to scripts and sites that trigger additional links
and fetches. Some are common prefetch and may never run except
the prefetch itself contained all the info needed to track an individual.

Since http and https are stateless the tricks of passing an interesting hash code
establishes a unique user profile tag...

It is too much like the Jedi mind control trick: This is not the Droid you
are looking for" becomes that is not the URI you are looking for. The entire
world is offered this or that DNS server that then connects to others
to translate a name to number. There is little in the system to validate
the answer. https almost helps but there are rogue SA hosts and depending
on the one you connect to you get what you expect or what Lenovo wanted
you to get. Packet injection tricks trigger errors that then trigger a second connection
that may be hacked.

Too much security legislation is theater and increasingly legislation moves
to punish white hat researchers or even random typing errors that uncover
foolishness.

A child in school that changes the background of an ill secured computer system
gets a felony warrant. A child that has a note sent home because a couple Oreo
cookies were seen in his lunch -- the world has gone mad. OK I am getting
mad at the fools that tell me my SO can swallow a camera to check for uterine
cancer or prenatal care: To which Barbieri responded: "Can this same procedure
then be done in a pregnancy? Swallowing a camera and helping the doctor determine
what the situation is?"

Comment Immortals are corrupting.... (Score 1) 302

Immortals are corrupting much of our law and have in the past.

In the past dynastic power bases ruled clashed with each other and crushed common people.
Kings, Queens, Caliphates, Dynasty, Emperors, Pope, Pulpit all are the sharp end of immortal government
systems that devolved in many social ways and were eventually upended.

Today we have some ill begotten immortal legal frameworks that have many
of the rights that citizens have. Their immortality allows them to gain power and move from
a part of society to controlling society.

This copyright issue is one symptom of an immortal (Mr. Mouse by way of example)
that wields power and attempts to dominate part or all of society. When these
immortals gather together as a group and throw their weight around, interesting
and perhaps troubling things happen.

Consider that immortals do not pay inheritance or death taxes. If one group of
legal entities never pays a tax no group should pay that tax. There are more
issues one of which is citizenship....

"end-two-cents"

Comment Re:Good for them (Score 3, Interesting) 148

I'm tired of these security experts holding these sites hostage. They should disclose these vulnerabilities to build a safer Internet, not to line their pockets.

If they really wanted to line their pockets, they'd sell them to ......

Groupon could hire people themselves to find the vulnerabilities, but they chose not to, instead they offer a bounty for security bugs, which apparently is very cost effective when they don't pay up, so it's a double win .......

I'm sure they do have their own people looking for vulnerabilities, but if outsiders also find vulnerabilities ....

Interesting...
Vulnerability testing is sometimes difficult from inside.
Companies have security policies that could make testing by employees quite difficult.
Testing from home is often excluded by company rules.
Network and hardware management also adds to this issue.
Laws are making it harder and harder for White hats to operate.

The issue of script rich "experts" hunting bounty is interesting.
First the bounty needs rules and pre disclosure rules need to be bounded in time.
Fixing it when I darn well want to is not no a working answer.

Script discovered flaws are likely industry standard flaws most with well known solutions.
A list of script triggered flaws that is as long as this tells me that the engineering
staff and management need to have their bonus packages reviewed. It seems
like a flawed culture. Non payment of the bounty is a symptom if the report
was held private for a fair length of time.

Some companies have "sat" on bugs and faults. The most famous list of faults
are enumerated in the security book written by Robert Morris. Almost none were fixed then
his son coded the Morris worm. That should have been the clue to the
industry but it was not. The response was mostly legal not technical which
is an inversion of the needs of national security where the laws of a nation
cannot protect from predators in other nations.

There is an astounding cognitive failure when a nation passes laws and fails to
to address the technical reach of those outside the reach of the law. Predator drones
are not an answer ...

This flawed protectionist mind set by many US TLAs is a problem.
Other nations have the same issue and should be filing bugs with vendors
left and right. Some nations might need a proxy for this but again
national laws could find these people acting as agents of a foreign government
to their loss of freedom.

Kafka is giggling.

Comment Re:Obvious (Score 1) 350

That's not "not clear", that's just an engineering problem. ......

Quite so... yet in this tenth of a penny pinching engineering world
it becomes a cost and a decision. In this case the resultant degradation
of the EBS seems to be unmanaged or over managed at much greater
expense and complexity.

Not all engineering problems have known solutions yet this one does
and that puts us in agreement.

Comment Never toss a phone... (Score 1) 1

It seems that this is a reason to never toss a phone.
If the iPhone can be abused the need to keep the old
Android or Win or Nokia phone in the closet seems valuable.

By the same token it seems important to keep an old iPhone
wrapped in tin foil sealed in a mayonnaise jar because it
is silly to think that any vendor is immune.

N.B. despite the strong push to collect old phones, all cell phones are required by law to have access 911 emergency
services in the US. Keeping an old phone and auto charger with no plan in the boot/trunk/glove box seems prudent.
BTW the credit for my last phone was $4 and it makes a fine Pandora server to a bluetooth speaker...

Comment So my FB number is 555-1212 as of 5 min ago. (Score 2) 1

This seems to be too desirable to hack.
There is a service and the implication is that someone calling you
is someone you know. That seems fragile. With a reversed hack the phone could
ring and that person could know a gosh darn lot about you and
extract more info to attack you, your home or your valuables (bank credit).

FB should have this service under a full security review like no other service
and have a serious audit process to discover and squash use anomalies.

Submission + - GCC 5.1 Released (gnu.org)

kthreadd writes: Version 5.1 of GCC, the primary free software compiler for GNU and other operating systems, has been released. Version 5 includes many changes from the 4.x series. Starting with this release the default compiler mode for C is gnu11 instead of the older gnu89. New features include new compiler warnings, support for Cilk Plus. There is a new attribute no_reorder which prevents reordering of selected symbols against other such symbols or inline assembler, enabling link-time optimization of the Linux kernel without having to use -fno-toplevel-reorder. Two new preprocessor directives have also been added, __has_include and __has_include_next, to test the availability of headers. Also, there's a new C++ ABI due to changes to libstdc++. The old ABI is however still supported and can be enabled using a macro. Other changes include full support for C++14. Also the Fortran frontend has received some improvements and users will now be able to have colorized diagnostics, and the Go frontend has been updated to the Go 1.4.2 release.

Comment Re:Obvious (Score 1) 350

It is also not clear what the regulations domestic and international are for testing the
FM radio for unwanted interference and matching the national band allocations.

Oh that is clear. There's very little. FM must not transmit (and I don't think any mobile chipset does), and it just has to receive in a certain frequency band which is mostly common throughout the world with no further consideration to interference. An analogue radio receiver is about the least regulated radio device you can build.

It is still not clear.... the FM block has a local oscillator. The bluetooth, the WiFi 2.4&5GHz, The Cell system, many bands... as well as the display, processor, memory etc... interact. Part 15 is almost easy in isolation but the RF complexity of turning on a tuner that sweeps the FM local oscillator and that might interact with passive traces, as well as other active systems is "interesting".

Having said this Motorola has it on two of the phones I have owned. Thus, It is possible and to me it is a reasonable expectation for this system to be enabled and active.

I feel strongly that the emergency context has been ignored. It is astoundingly easy to overspend or underspend on emergency systems. Emergency system managers have apparently missed this erosion of a worthy component. Combined this with the demise of plain old telephone services with its legal framework for battery power (etc.) that the cell system and internet does not have and Houston we have a problem.

These are systems and interconnected in poorly understood ways. Changes have consequences some good some bad most unintended. Media coverage wants to reduce important issues to a two team sporting contest and this is just wrong for understanding systems.

Programmers know how difficult "make" rules can get and some know
why "makedepend" gets it wrong at times (this is after all a /. geek centric forum).

Submission + - Wi-Fi Attack Breaks iPhones By Locking Them Into an Endless Loop (pcmag.com) 1

An anonymous reader writes: Researchers from Skycure demonstrated a novel attack at the RSA 2015 conference that affects iPhones and other iOS devices. The attack, which takes advantage of new and previously announced vulnerabilities, locks iPhones into a never-ending reboot cycle effectively rendering them useless.

Developing a Denial of Service Attack
Skycure CEO Adi Sharabani explained that this attack began when Skycure researchers bought a new router and were messing around with its network settings. In doing so, they discovered a particular configuration that caused apps in iPhones connected to that router to crash whenever they launched.

Slashdot Top Deals

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...