Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:It's true -- but only root can read them though (Score 1) 341

If the attacker is already root, they have access to everything on your system anyway.

Not quite. Root access means a compromised single host. Access to a list of WiFi passwords means compromising all the WiFi networks the machine in question has been given access to, so you'd still want that encrypted.

Comment Won't they hit the ISS on a future orbit? (Score 4, Insightful) 52

Won't they circle back around and hit the ISS on a future orbit? I'm no rocket scientist, but I recall the idea that anything that departs from a given point in orbit will cross it again, and two objects leaving the same orbital point will both cross it again.

Maybe solar or atmospheric drag is enough to alter the cubesat orbits, and I know the ISS orbit is raised periodically, but since they were launched FROM the ISS by expelling them, instead of having a propulsive system, both the ISS and the cubesats left a single point in space and ought to converge there again.

I'd welcome an explantion from a real rocket scientist.

Comment Re:I think they understimate the cloud (Score 2) 292

Yawn. Yet another tech answer to what isn't a tech problem to start with. I suspect there will be gazillions more coming your way over the next few months because all the Silicon Valley entrepreneurs want to milk that market before people realise they've been had: IT IS NOT A TECHNICAL PROBLEM.

For a US based company it is 100% pointless to install any defence mechanism if some random official can walk in and ask for corporate data - the owner has to offer the data., unlocked.

For any organisation outside the US, it should simply ask the question: what are the chances that a US based organisation will NOT have a backdoor in its technology if such can be legally prescribed? As you have seen with Lavabit and Silent Circle, there are in principle only two ways forward: comply, or close shop. I leave you to note the clear risk in using security products from those who provide security products who have not closed down yet. Note: I'm not stating that all US sourced security products HAVE been provided with a backdoor, merely that it is legally possible to force the suppliers to implement them.

Eventually, someone will realise the real risk to the US economy: it's a profound lack of trust. This will take decades to fix, mainly because it involves a fight to either repeal those emergency laws or introduce some independent transparency and supervision. Meanwhile, whole swaths of Silicon Valley people will continue to sell what is at best privacy theatre, but which also risks becoming nothing more than security theatre as well.

Because backdoors and security do not combine very well.

Comment Re:First always on wifi, now force fed cloud print (Score 1) 135

Funny, that was about the first thing I thought too.

Wrt your other complaints I could, of course, observe that other platforms offer a much finer granulation of access control, even AFTER installation, but we still have to acknowledge that being asked is better than not being asked at all, as was the case before..

Comment Wrong country.. (Score 1) 168

I gather from your use of the "K-12" term that you're in the US (keep that in mind when you ask such questions).

Your challenge is that you're up against several decades of brainwashing to make you (and parents) believe that your privacy isn't worth anything that that it's somehow bad to insist that the state and companies respect the rights they signed up to when they accepted the Universal Declaration of Human Rights in 1948 (actually there's also such a thing as the right of the child, but both Somalia and the US declined to underwrite that - don't know enough about that to draw a conclusion).

You see, this is the origin of the term "free" in "free" services - all you need to give up is some privacy. So it's not free, you pay with your privacy. What is interesting is that the worst offenders have managed to turn the debate on its head.

You don't have to defend your right to privacy. It's yours, and it's supposedly inalienable. Those who want to invade your privacy have to explain themselves.

Bonus argument for parents: personal details on sites tend to be one programming mistake away from disclosure. Your guiding principle for providing anything to a 3rd party on the Internet is that it is equivalent to giving it to your worst enemy. What's worse, the Internet doesn't forget - this means you're giving information to enemies you haven't even made yet..

Comment Re:None of them (Score 2) 391

The OP is right insofar that a browser is only one part of the chain of events that ties an identity (and associated habits) to you. Even when you use something Firefox or Opera in so-called "private" mode, your traffic still originates from the same point, creating a common item between things that happen (and BTW, you should set your browser to be something else than the default "OS + browser ID").

The expensive way to address that is to route your traffic via some privacy proxy. The expensive way to do this (used by most VIPs and privacy conscious celebrities) is to use specialist companies which map this traffic via VPNs to any part of the planet. The cheap way to do this is by using Tor, but it would be decent of you to then keep your Internet use as much as possible to text as other people are paying.

Comment And this is NEWS? (Score 1) 193

Since RFIDs landed in passports it's been a fairly badly held secret that the only thing that limits the range of such devices is the quality of the antenna and the transceiver.

The only reason those terminals work on proximity is because they use crap aerials. All it takes is a larger aerial and you can get up to max 10 meter range (beyond that the S/N ratio becomes an issue).

The only real question is why card companies are pretending they don't know this.

When have you ever known a card company to limit its opportunity to get you into interest paying debt? Why else do you think they put a payment limit on NFC transactions?

Submission + - A perspective: developers vs. Microsoft (reactos.org)

jeditobe writes: Most people understand that Windows is used by a variety of people who have a variety of needs, ranging from corporate server to workstation to POS terminals to home PC and beyond. Most people accept that whenever Microsoft updates Windows, it has to balance the competing requirements to find some kind of workable compromise. There is however another set of competing requirements that many do not really register, even those that call themselves power users or are IT admins. It is a conflict between developers/programmers and Microsoft itself

Submission + - Android kernel GPL violation continues to unfold (anthrax-kernels.us)

An anonymous reader writes: Prominent GPL violator, Chad Goodman, of Anthrax Kernels has published a new manifesto defending his shady practice of distributing Android kernels without sharing source.

Comment Re:...Evidon, who also owns Rapleaf? (Score 1) 78

Sadly, what you have done is not enough.

You missed Google fonts. Practically EVERY Wordpress template contains them as it's one of the few resources available to create a better design without having to license fonts for download. Google doesn't do that out of the gentleness of their non-existing hearts: every time you load a Wordpress page which uses Google fonts you create a hit on their fonts API.

Granted, if you nuke cookies they will not have a fully accurate lock on you as a person, but that's where geolocation comes in - Google does not HAVE to be accurate, all they need is a reasonable approximation. In principle we should ALL use the web via proxy, but it's ridiculous that I have to defend what is my RIGHT because setups like Google are allowed to break the law with impunity (at least in Europe)?

Comment Re:What about the idea (Score 1) 133

The ISP was also providing email, but yes, the technically correct expression should have been "email provider".

There is a degree of irony in this. Many years ago, I was behind the cleanup of a VERY large email provider in Hong Kong who had so many spam problems in their client base that we had to start with a network containment process before we started to tackle the clients, so it's not that I'm unfamiliar with the problem or unsympathetic to Spamhaus - I just observe that from a neutral perspective, Spamhaus is not perfect.

Realistically, they can't be, because the sheer volume of spam they deal with makes anything but automation impossible and it is thus important that you have measures in place to detect being blacklisted. It may not be your fault, but you will suffer the effects.

Comment Re:What about the idea (Score 1) 133

Believe me, if we were blocking legitimate mail, our users would complain. It's not happening.

How would they know they're not receiving email? I'm all for what Spamhaus does and have used their lists on many mail servers, but I have also been on the receiving end when they had it wrong.

I was abroad, and the ISP I was using was blocked. Spamhaus basically tells you "talk to the ISP", but if you're dealing with a large ISP the theory that they will pay any attention to you doesn't always work. It wasn't difficult to solve (just grabbed a Yahoo account), but Spamhaus *can* get in your way, especially if you hang off a shared IP address.

Slashdot Top Deals

Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (5) All right, who's the wiseguy who stuck this trigraph stuff in here?

Working...