Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment code reviews are perfect and impossible ? (Score 4, Insightful) 419

> Russian FSB has actually wrung Windows code reviews out of Microsoft so if they didn't find any back door in that code I'd say there are none to find...

So it's entirely possible to do a code review of an entire operating system and be sure that there are no vulnerabilities?
Of course, you can't be sure that something as simple as an ssl library is safe, but an entire OS is no problem. Despite the fact that there's no way to know if the code you're reviewing matches the installed binaries.

> there is always the option of doing a personal code review of what is it now, 200 million plus? lines of Linux source code and then compiling your own Slackware
Yep, that'd be even easier than the Windows code review, especially since thousands of other people have already done some initial review for you. You can then compile it yourself and know that the source code matches the binary, unlike Windows.

(The trojaned compiler attack is fairly trivial to defeat, so don't bother going there .)

Comment Usual despicable fear-mongering (Score 1) 369

Some cretins dreaming about bio-weapons does not give them any real capability. And no, they are neither easy to make nor cheap nor easy to use. This is just the usual exceedingly unethical fear mongering used to sell more copy and to keep the population docile.

It is also not a new tactics, but most people are still cretins that fall for it every time:

The whole aim of practical politics is to keep the populace alarmed (and hence clamorous to be led to safety) by menacing it with an endless series of hobgoblins, all of them imaginary. -- H.L. Mencken

Cellphones

Ask Slashdot: Best Phone Apps? 167

An anonymous reader writes: The phone app ecosystem has matured nicely over the past several years. There are apps for just about everything I need to do on my phone. But I've noticed that once an app fills a particular need, I don't tend to look for newer or potentially better apps that would replace it. In a lot of areas, I'm two or three years out of date — maybe there's something better, maybe not. Since few people relish the thought of installing, testing, and uninstalling literally hundreds of apps, I thought I'd put the question to the Slashdot community: what interesting, useful new(ish) apps are you aware of? This can be anything from incredibly slick, well-designed single purpose apps to powerful multi-function apps to entertainment-oriented apps.

Comment Re:This initiative is futile (Score 1) 51

While that certainly plays a role, it is a minor one. It does stand in the way of solving things, but if you do not have developers that can do secure software engineering competently (and that is the normal case), then giving them too little time and money to do secure software engineering does not matter. The other thing is that people that actually understand software security are much less likely to declare something finished or secure than those with only a superficial understanding of things. Software security really is an additional, and exceedingly hard to obtain, qualification. That most "programmers" these days struggle even with simple things (see http://blog.codinghorror.com/t... , for example) is not the root cause.

Comment Re:Good (Score 2) 108

I don't necessarily like knowing cops have this information but so long as there's rules over the collection (see above) I'm okay with this. If the EFF and ACLU (whom I normally support) wants the actual data, they can get their own OCR license plate cameras and drive around.

If the data doesn't belong to us, then the cops don't work for us, either. If we don't have a right to the methodology, then we're simply slaves.

Privacy

Judge Allows L.A. Cops To Keep License Plate Reader Data Secret 108

An anonymous reader writes: A Los Angeles Superior Court judge has ruled that the Los Angeles Police Department is not required to hand over a week's worth of license plate reader data to the American Civil Liberties Union (ACLU) and the Electronic Frontier Foundation (EFF). He cited the potential of compromising criminal investigations and giving (un-charged) criminals the ability to determine whether or not they were being targeted by law enforcement (PDF). The ACLU and the EFF sought the data under the California Public Records Act, but the judge invoked Section 6254(f), "which protects investigatory files." ACLU attorney Peter Bibring notes, "New surveillance techniques may function better if people don't know about them, but that kind of secrecy is inconsistent with democratic policing."

Comment Re:35mm film (Score 1) 635

A couple of years ago I picked up a Pentax 67 with the personal commitment to put a few rolls of 120 through it every year. You can get great lenses for stupidly cheap prices if you keep an eye on that auction site. Provia for landscape/nature work - there's nothing like a big, brilliant transparency.

--
.nosig

Submission + - Hidden Obstacles for Google's Self-Driving Cars (technologyreview.com)

Paul Fernhout writes: Lee Gomes at Technology Review wrote an article on the current limits of Google self-driving car technology: "Would you buy a self-driving car that couldn't drive itself in 99 percent of the country? Or that knew nearly nothing about parking, couldn't be taken out in snow or heavy rain, and would drive straight over a gaping pothole? If your answer is yes, then check out the Google Self-Driving Car, model year 2014. Google often leaves the impression that, as a Google executive once wrote, the cars can "drive anywhere a car can legally drive." However, that's true only if intricate preparations have been made beforehand, with the car's exact route, including driveways, extensively mapped. Data from multiple passes by a special sensor vehicle must later be pored over, meter by meter, by both computers and humans. It's vastly more effort than what's needed for Google Maps. ... Maps have so far been prepared for only a few thousand miles of roadway, but achieving Google's vision will require maintaining a constantly updating map of the nation's millions of miles of roads and driveways. Urmson says Google's researchers "don't see any particular roadblocks" to accomplishing that. When a Google car sees a new permanent structure such as a light pole or sign that it wasn't expecting it sends an alert and some data to a team at Google in charge of maintaining the map. ... Among other unsolved problems, Google has yet to drive in snow, and Urmson says safety concerns preclude testing during heavy rains. Nor has it tackled big, open parking lots or multilevel garages. ... Pedestrians are detected simply as moving, column-shaped blurs of pixels — meaning, Urmson agrees, that the car wouldn't be able to spot a police officer at the side of the road frantically waving for traffic to stop. ..."

A deeper issue I wrote about in 2001 is whether such software and data will be FOSS or proprietary? As I wrote there: "We are about to see the emergence of companies licensing that publicly funded software and selling modified versions of such software as proprietary products. There will eventually be hundreds or thousands of paid automotive software engineers working on such software no matter how it is funded, because there will be great value in having such self-driving vehicles given the result of America's horrendous urban planning policies leaving the car as generally the most efficient means of transport in the suburb. The question is, will the results of the work be open for inspection and contribution by the public? Essentially, will those engineers and their employers be "owners" of the software, or will they instead be "stewards" of a larger free and open community development process?"

Submission + - Wi-Fi Router Attack Only Requires a Single PIN Guess (arstechnica.com)

An anonymous reader writes: New research shows that wireless routers are still quite vulnerable to attack if they don't use a good implementation of Wi-Fi Protected Setup. Bad implementations do a poor job of randomizing the key used to authenticate hardware PINs. Because of this, the new attack only requires a single guess at the hardware PIN to collect data necessary to break it. After a few hours to process the data, an attacker can access the router's WPS functionality. Two major router manufacturers are affected: Broadcom, and a manufacturer to be named once they get around to fixing it. "Because many router manufacturers use the reference software implementation as the basis for their customized router software, the problems affected the final products, Bongard said. Broadcom's reference implementation had poor randomization, while the second vendor used a special seed, or nonce, of zero, essentially eliminating any randomness."

Submission + - Reformatting a Machine 125 Million Miles Away (nasa.gov)

An anonymous reader writes: NASA's Opportunity rover has been rolling around the surface of Mars for over 10 years. It's still performing scientific observations, but the mission team has been dealing with a problem: the rover keeps rebooting. It's happened a dozen times this month, and the process it a bit more involved than rebooting a typical computer, taking a day or two to get back into operation every time. To try and fix this, the Opportunity team is planning a tricky operation: reformatting the flash memory from 125 million miles away. "Preparations include downloading to Earth all useful data remaining in the flash memory and switching the rover to an operating mode that does not use flash memory. Also, the team is restructuring the rover's communication sessions to use a slower data rate, which may add resilience in case of a reset during these preparations." The team suspects some of the flash memory cells are simply wearing out. The reformat is scheduled for some time in September.

Submission + - States Allowing Medical Marijuana Have Fewer Painkiller Deaths (smithsonianmag.com)

An anonymous reader writes: Narcotic painkillers aren't one of the biggest killers in the U.S., but overdoses do claim over 15,000 live per year and send hundreds of thousands to the emergency room. Because of this, it's interesting that a new study (abstract) has found states that allow the use of medical marijuana have seen a dramatic reduction in opioid overdose fatalities. "Previous studies hint at why marijuana use might help reduce reliance on opioid painkillers. Many drugs with abuse potential such as nicotine and opiates, as well as marijuana, pump up the brain’s dopamine levels, which can induce feelings of euphoria. The biological reasons that people might use marijuana instead of opioids aren’t exactly clear, because marijuana doesn’t replace the pain relief of opiates. However, it does seem to distract from the pain by making it less bothersome." This research comes at a time when the country is furiously debating the costs and benefits of marijuana use, and opponents of the idea are paying researchers to paint it in an unfavorable light.

Slashdot Top Deals

"Ninety percent of baseball is half mental." -- Yogi Berra

Working...