Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:If all goes well. . . (Score 2) 228

You CAN'T opt-out of being tracked.

Yes, you can, at least with Google. Google provides opt-out tools, and they work. I know some of the engineers who work on opt-out and they're quite serious about ensuring that nothing identifiable gets stored about users who present an opt-out cookie. Any team that tried to work around opt out would be in trouble... and would get Google in trouble during its regular FTC privacy audits, pursuant to the consent decree Google signed.

(Disclaimer: I work for Google, but I don't speak for Google. The above represents only my personal opinions.)

Comment Re:If all goes well. . . (Score 1) 228

Google gets your permission to vacuum the contents of Gmail, liberate data from your Android phone, and then somehow, removing "personal identifiable information", liberates this data and sells it to others, who reassemble the information.

This is a common misunderstanding of Google's business model. Google doesn't sell information. At least, not very much. I think there are a few minor products that involve selling aggregated, statistical information, but they're an insignificant part of Google's revenue stream. Where Google makes money isn't by selling information about users, it's by using information about users. Google doesn't deliver information to advertisers for them to decide who to advertise to, Google accepts ads from the advertisers and uses the information it has to decide which ones to show to which users. Advertisers don't see the user data and have very little control over the targeting of their ads, which is fine with them because Google is better at the targeting than they are anyway.

(Disclaimer: I work for Google, but I don't speak for Google. The above is all public information.)

Comment Re:Just give the option to turn it off... (Score 5, Informative) 823

In fact, there is something nice about a Tesla or Prius's silence at idle

Unless you're blind, or happen to be looking the other way when the drunk in a prius bears down on you.

My Nissan LEAF has a speaker mounted in the driver-side front wheel well which makes noise (a tone that sweeps across the frequency range, to cover people with frequency-limited hearing) whenever the vehicle is moving below 20 mph. It's not fake engine noise, it's better.

As to the article... I have learned to really enjoy the silence of an EV. Engine noise annoys me.

Comment Re:Less creepiness (Score 1) 324

That's true... but why doesn't it apply to Android phones? They're also associated with Google, and also have cameras.

FWIW, I think Google has a big PR problem to solve here. The perception that Google slurps up all information available isn't really correct, either, but it's pretty difficult to convince people of it. The Google dashboard was an attempt to show people what Google actually knows about them but (a) hardly anyone knows about it and (b) most who look at it assume that it's only what Google wants them to know that it knows.

I think in the long run the only solution for Google is to move away from advertising, to a payment-for-services model. That won't happen with much of the existing service suite, but advertising can be de-emphasized by growing in other directions.

Comment Re:Less creepiness (Score 1) 324

Agreed, but see:

Covert surveillance is also now mostly trivial, but it's not socially acceptable and very few people actually do it

Citation needed, but at least perceptually I don't feel like everyone is sneakily recording my private conversations at a restaurant.

This gets to the heart of the matter; it's all a question of perceptions/feelings. Perhaps it's because of something in Google's original ads and videos about Glass, or something else, but people perceive the main purpose of Glass to be video recording and assume that anyone wearing one is recording them, while they don't think the same thing of phones with cameras. Even though phones are actually better video recording devices, and almost as easy to record with covertly.

(Disclaimer: Because some AC thought I should mention it, I am a Google employee. I don't work on Glass, and don't speak for Google, though. This is only my own personal opinions. I've only used Glass a handful of times myself, though I've frequently been around other people wearing one.)

Comment Re:Say goodbye to security (Score 1) 186

Subverting it requires subverting the bootloader sequence, which starts with code in on-SoC ROM, which is nearly impossible to modify, and I add the "nearly" only because nothing is impossible; I sincerely doubt that any agency is able to modify silicon without destroying the CPU and I'm quite certain that if anyone can it's a very closely-held, and therefore rarely-used, secret.

Oh, no. If they can do it, then how often they do it will be limited only by budget.

It will also be limited by not wanting to reveal that they have the capability. Per a former-NSA colleague of mine, that is often the more stringent restriction.

But I'm more concerned about back doors. How do you know there aren't any in there?

I'm fairly certain there aren't any in the Nexus 6 or Nexus 9 low-level boot or hardware security code. However, there certainly could be in firmware blobs. Those run in non-secure mode, but all your data is also accessible from non-secure mode.

That said, the Android security team pays pretty close attention to exploits in the wild, so if there were something like that being exploited on a large scale, I think we'd know. Exploits that are used only for so-called "targeted persistent attacks", whether by criminal organizations or government agencies are a different story, of course, but those simply aren't relevant to most people.

And I'm also somewhat concerned about security flaws. Sometimes just connecting things in nonstandard ways bypasses security measures.

Sure, that's why I said "the next option is to exploit some defect...".

The next option is to exploit some defect in the implementation of the bootloaders and/or fastboot (or in the case of intelligence agencies, even to implant a defect to be exploited). This is probably the best avenue of attack, but it's not easy because the code in question is relatively small, and should be closely scrutinized. Most of it is not open source, though, so scrutiny is limited.

Another fine place for a back door, though, and still not that unlikely that a flaw will exist there. The critical code paths should be sufficiently short that it's worth disassembling them.

You seem to be restating what I just said :-)

The final option is to ignore all of the above and simply attack the hardware. Remove the flash chips and install them in a custom device which reads out their contents. This threat is what device encryption exists to mitigate.

Well, I'm strongly in favor of encryption. But I still don't trust the hardware, so I don't trust my phone to keep secrets.

Keep what secrets from whom? If the NSA is really your adversary and they're specifically targeting you, you're simply screwed. Seriously, give up now. My goal is to ensure that your device is secure against (a) remote network exploits, (b) locally-installed software and (c) hardware attacks of moderate sophistication. (c) definitely includes "I lost my device and some clueful hardware engineer found it".

Assuming you're running up-to-date software (yeah, much easier said than done, I know), haven't done anything yourself to compromise the Android security model (e.g. running around with an unlocked bootloader) and have a reasonably-good password and an encrypted file system, I give you high odds of being perfectly safe against (a), (b) and (c).

Comment Re:Say goodbye to security (Score 1) 186

You hope that's true.

Actually, since it's closely related to my day job (Android hardware-backed crypto), I have quite deep knowledge of exactly how true it is or is not.

Subverting it requires subverting the bootloader sequence, which starts with code in on-SoC ROM, which is nearly impossible to modify, and I add the "nearly" only because nothing is impossible; I sincerely doubt that any agency is able to modify silicon without destroying the CPU and I'm quite certain that if anyone can it's a very closely-held, and therefore rarely-used, secret. Supposing the initial bootloader can't be subverted, subverting later bootloaders (which are stored in flash) is also difficult, since they're signed and signatures are verified by the hard-to-subvert boot ROM. There are two obvious ways: break the cryptographic signing, or obtain the signing key. There's no doubt that intelligence services could do the latter. It's unlikely that they would share the signing key, or the subverted signed code, with law enforcement since doing so would make their ability known. It's unlikely in the extreme that criminals would obtain either the key or the subverted signed code. I'll dismiss the notion that someone can break the crypto directly.

The next option is to exploit some defect in the implementation of the bootloaders and/or fastboot (or in the case of intelligence agencies, even to implant a defect to be exploited). This is probably the best avenue of attack, but it's not easy because the code in question is relatively small, and should be closely scrutinized. Most of it is not open source, though, so scrutiny is limited. This is an avenue law enforcement and criminals could use, if there are exploitable defects. If there are any such defects in any Android devices, I don't know of them, and if they were in any sort of widespread use, I would. If such exploits exist, they're being held close by criminals (for TPT-style attacks) and not being used by LE or intelligence agencies in any context which might reveal them publicly... such as in court.

The final option is to ignore all of the above and simply attack the hardware. Remove the flash chips and install them in a custom device which reads out their contents. This threat is what device encryption exists to mitigate. Pre-Lollipop, the strength of FDE depended entirely on the strength of the user's password. In Lollipop it was strengthened with the use (where available) of a key bound to the device SoC.

Comment Re:WHO forced them? (Score 1) 141

"I'm not sure if these factors make a measurable difference in tire wear, but it's plausible."

EVs are HEAVY. So far all the indications I've seen is that the tires wear faster as a result.

Good point. I wanted to argue but I looked up some numbers, and EVs tend to be several hundred pounds heavier than comparable ICEVs. I though the weight of the batteries would be offset by the lighter motor, but apparently not.

Comment Re:Data about where and how people drive? (Score 1) 238

Google maps uses WAZE to gather traffic info. WAZE is a great app if you use it, giving alternate routes around traffic as it discovers them.

Google Maps uses both WAZE and Google Maps to gather traffic info. Mostly Google Maps, I suspect, since the userbase is much larger... though WAZErs do tend to have WAZE running all the time while most Google Maps users only use it when they're actually getting driving directions, so I may be wrong.

Oh, and Google Maps also gives you alternate routes around traffic as it discovers them. It's a bit less aggressive about it, I think, requiring a larger potential time saving before prompting a re-route.

Slashdot Top Deals

Beware of Programmers who carry screwdrivers. -- Leonard Brandwein

Working...