Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:Bit torrent in dire need of fixing (Score 1) 187

You cannot have Bittorrent work (distributing files to anyone who wants to get them) while blocking the bad guys from participating because the bad guys can be anyone.

Solving the problem does not require limiting participation. Solving the problem requires limiting **knowledge** of activities of other participants. It is possible to limit discoverability of intent of individual participants in the same way Tor limits discoverability of identity. The only requirement is having significantly more good actors than bad actors in the system.

Alternatively, you can't have Bittorrent be efficient (fast) if you plug it full of fake data.

I don't imagine any such activity would necessarily require much overhead. Just enough to generate doubt and plausible deniability.

The ONLY way to solve it is as I have stated. This is how the internet works. It's the fundamental design of the thing.

The Internet is just a means of conveying packets of information between peers with some certainty of delivery. You can build any structure you want on top of it including a separate overlay network there are no inherit limits.

For example if access in bit torrent were on a random basis resolved by indirect requests on behalf of others nobody could be sure of original intent of any requestor only they would know if they are the ultimate consumers. The same onion routing techniques that make tor work can be leveraged to fix bit torrent.

Comment Re:Bit torrent in dire need of fixing (Score 1) 187

Every single packet touching a major ISP is logged and tracked by the government.

While we should assume as much this type of information is out of reach of MPAA. Sniffing transport isn't the problem and isn't how MPAA is gathering their data for infringement notices.

The problem is anyone on bit torrent network is able to infer activity of many many many other people just by normal participation in the bit torrent protocol.

Access to room 641A *not required*.

If you want SECURE communication establish the security OFFLINE. You CANNOT trust the channel.

Secure communication is not really the point in this context... exchange between peers just needs to be facilitated differently so there is less global visibility and perhaps some spoofing/red herring activity to lower credibility of any data collected.

I understand there is inherent risk in the proposition ... fundamentally asking the kinds of questions bit torrent clients ask requires some measure of discoverability and associated risk of detection yet there is much room for improvement left on the table.

Tor network while not perfect is able to afford users some privacy -- it can be done and does not need to be perfect.

Comment Bit torrent in dire need of fixing (Score 1) 187

Problem is any actor with money who wants it is able to extract a more or less complete picture of activity occurring on bit torrent.

The system as it exists today is simply too open and too transparent creating a lightning rod from intelligence being wielded to justify all manner of legislative unpleasantries.

If exposure issues are not fixed in bit torrent eventually we will see legislative reality that harms everyone more than any illegal activity.

Comment Re:Why is Android allowing Uber to access the info (Score 1) 234

So yes, you're right. No app should be able to take your personal information without your consent. That isn't what's happening. The problem is that you're giving them your consent by using the software, you're just too lazy and ignorant to bother actually reading the legal terms, to take the five seconds or so it takes to scan the list of capabilities and permissions the app supposedly "requires" to run.

The text from TFA is as follows: "and your SMS and MMS logs, which it explicitly doesn't have permission to do."

What permission in the list of permissions asserted in the manifest grants SMS and MMS log access? Does it access your google account and download data from a backup? How is it doing it? Name the permission which enables this activity.

You hand the stuff over to them, you have nobody to blame but yourself. You certainly can't blame Android for "allowing" it because it doesn't "allow" it unless you EXPLICITLY ALLOW IT YOURSELF.

I'm not down with blaming the victim when a platform has been intentionally engineered to fuck over users.

The Uber app isn't a virus, it doesn't install itself through some unpatched exploit.

If facts asserted by TFA are correct it is spyware.

You get what you deserve. Truth hurts, I know, but blaming Android for your own, personal failings and naievety makes you look really fucking stupid.

Would love to know which permission explicitly grants SMS access.

Comment Re:It DOES have permission (Score 2) 234

I just went to the google play store page for Uber, and checked the permissions the app requires. It includes:

Read your Contacts, take pictures, status and identity, modify system settings, read google service configuration, and a host of others.

So, based on this (admittedly limited) information, it doesn't seem to be bypassing google security so much as utilizing the proper channels to claim superior access to the user's phone.

What I don't understand is the SMS claim. Is Uber exploiting a vulnerability to get SMS data or do these other permissions somehow grant some kind of access to SMS as well?

There is a whole group of SMS privileges and according to the app store not a single one is being claimed... so what gives?

Comment Outlawing plea deals should be a national priority (Score 2) 219

When the word plea bargain is spoken all I hear is "forced confession" in keeping with traditions of the worlds leading jailor the United States of North Korea.

People should simply be charged with whatever the crime they are accused of committing... It just isn't the act of using coercion to force a desired outcome alone it is all the second order effects this practice asserts on the whole system turning everything to shit.

Maximum sentences are allowed to pierce the stratosphere because nobody notices when insane sentences are merely threatened but not actually handed out.

Laws are intentionally written in broad terms to be used as a weapon yet again nobody cares because it does not happen.

And before you know it in all ways that matter we are back to kings jailing the peasant fools they happen to dislike.

Comment Why I hate CNN (Score 1) 1128

News media are nothing more than trolls pushing peoples buttons to whore attention and viewership. They race bait constantly and bark like rabid dogs whenever someone calls them on rampant hyperbole and worthless mental masturbation invoked to kill time in the absence of any actual news or evidence.

First thing out the gate today after announcement was Mr Tooooobin getting all hot and defensive about Bob calling out misleading bullshit coming from the media.

The equation seems to be keep the masses divided by stoking tribalism while systemic issues and gross injustices ... stop and frisk, racial profiling, quotas/revenue generation, plea deals, minimum sentences, prosecutor incentives divorced from truth seeking, war on drugs, existence of unenforceable laws and general systemic failure to counter human tendency to abuse power that comes with badge and gun go largely ignored and unaddressed.

The media always hides behind the notion they are just reporting or that tribalism is a valid topic. This is bullshit. They get to choose what they go all MH370 on and what they remain silent about. Their decisions very much affects reality and are very much determined by their pursuit of attention... they are professional trolls.

Comment Re:This is the voice of world control. (Score 1) 106

a nuclear warhead going off in a silo, especially where the United States and the old Soviet Union put most silos, is a meh.

It's not a meh, it's a myth. The physics package can only be triggered after a fairly complex set of conditions have been fulfilled, starting with launch authorisation, a period of high acceleration, a period of zero-G (long enough for the warhead to have moved outside the continental US), re-entry heat, and so on. And unlike any number of Hollywood movies, this isn't something you can bypass by uploading a hotfix, it's fixed-function stuff that can't be changed.

Another thing about these gee-whiz national-lab designs is that they've been coming up with them since the 1980s (and probably earlier than that, I wasn't around then). None of them ever get used. They eventually find their way into civilian applications (things like MEMs, PUFs) years or even decades after the national labs come up with them, but they're never used for arms control due to a mix of massive inertia, difficulty in turning a proof-of-concept into a fieldable item, and the fact that deploying them typically requires renegotiating international treaties.

(This is a very abbreviated description of something that'd take a book to cover).

Comment Re: Damn! (Score 2) 161

Mozilla is squandering the money they have. It should be shows around to a range of open source projects. That sort of money could free dozens of major and important projects from their corporate sponsors' agendas.

That was my reaction as well. If Chromefox and a bunch of money-wasting vanity wank ("Firefox OS") is all we're getting for $300M, Google should be asking for their money back.

Comment Re:Better go kick WSUS into a sync... (Score 1) 178

I don't know what the deal is, but it looks like maybe Microsoft stopped testing security patches on August's patch tuesday, or something.

Having recently "downsized" their QA staff testing work has been outsourced to paying customers.

When they say they will release a patch 10 AM PST this represents the time they will have managed to get it to compile.

Slashdot Top Deals

"May your future be limited only by your dreams." -- Christa McAuliffe

Working...