Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Bitcoin users also MITM by exit nodes recently (Score 2) 126

There have been several reports of Bitcoin users that use online wallets and exchanges, even over https, getting MITM attacked when using Tor. They visit the wallet site, get bad certificates but continue anyway, and poof, their Bitcoins in the service are gone and their passwords are known by the attacker. With recent SSL vulnerabilities or clever redirection, the cert errors could be avoided also. For other sites, users can be piped through a "universal phisher" to steal any credentials.

Clearly Tor users are under attack by exit nodes, many of them running automated tools against many web destinations.

Comment Re:As it is designed to do (Score 3, Insightful) 147

It works as designed, however it works against the interest of the user. A perfect example is the unmovable and unremovable search button next to the start button that opens Bing search. Just like on Windows phones with a physical search button made useless because it cannot be configured to do anything but open Bing, this is just another operating system iteration that does what Microsoft wants, users be damned.

The best reply and what every user actually wants: "be Windows 7 after I disable all the bloat and UI garbage, libraries, and homegroup cruft you put on that OS".

Submission + - JP Morgan Chase Attacked; data for 76million stolen

JakartaDean writes: J.P. Morgan Chase said about 76 million households were affected by a cybersecurity attack on the bank this summer in one of the most sweeping disclosed breaches of a financial institution.

The largest U.S. bank by assets said the unknown attackers stole customers’ contact information—including names, email addresses, phone numbers and addresses. The breach, which was first disclosed in August and is still under investigation by the bank and law enforcement, extended to the bulk of the bank’s customer base, affecting an amount equivalent to two-thirds of American households. It also affected about seven million of J.P. Morgan’s small-business customers. It isn’t clear how many of those households are U.S.-based.

The bank said hackers were unable to gather detailed information on accounts, such as account numbers, passwords, Social Security numbers or dates of birth. Customer money is “safe,” the bank said in a statement to customers on Thursday.

Submission + - Google drops authorship with picture from search results.

qubezz writes: Did you notice the pictures of "experts" in your Google search results over the last few years? If a webmaster wanted a site to appear fancy and stand out in search results, a Google Plus profile had to link to your site, and pages recognized as articles needed continuous creation.

The "Authorship" feature, which rolled out in 2011 as another part of the Google+ social and real name marketing push, had its author profile pictures pulled from the search results in June this year. The remainder of the feature is now finally dead, with little fanfare.

Emil Protalinski at thenextweb.com (note the importance of author?) reports:

Google today stopped showing authorship in search results, meaning articles will no longer include a link to the Google+ profile of their author. The company says that it found the information isn’t as useful to its users as it hoped, and in some cases even distracts from the overall search results.

Comment Pot calling the kettle black (Score 1) 110

Centurylink (which in this territory acquired Qwest, which was the local baby bell USWest after the AT&T breakup) does their own slimy anti-competitive tricks with their monopoly.

While DSL providers were required to allow third-party ISPs as a choice to customers (where the copper is Centurylink but the ISP is your choice), they limited the third party ISPs to 7mbps connections while rolling out their own ISP service at 30mbps. Whereas the ISPs provide professional and business class service, Centurylink's service is of course crummy PPPoE dialup with constant dropping and changing IP address, making it pretty much useless for anything except looking at web pages and impossible to use with most off the shelf network hardware.

They are hardly the ones to be speaking about preventing competition.

Comment Re:And here I'm hoping... (Score 1) 681

Windows 8 has already made itself incompatible with most non-x64 processors anyway. It requires SSE2, PAE, and NX bit, which are features that CPUs, say a Pentium 4 Extreme Edition 3.46GHz or a Pentium 4 HT 571 3.8GHz, do not offer. Doesn't matter that you have 8GB of RAM and an SSD in them. Believe me, these CPUs are fine for just about any office task.

Windows 8 runs on crap tablet hardware but won't run on CPUs that can run MFLOPS around them due to a few CPU features.

Comment TV and monitor manufacturers also (Score 1) 289

This has been happening for many years in computer monitors and televisions also. There will be an initial version sold for a few months that gets the reviews, and then the specs are changed - completely different LCD panels made by different manufacturers are substituted silently, often with different technology. Anecdotally early versions of an Acer monitor having a MPVA panel, and then the exact same model then shipping with TN panels that pale in performance compared to the original. With monitors, you are buying an AO Optronics panel in a box labeled Samsung, so when the same model gets you something inferior to both specifications and original reviews, it borders on fraud.

Comment Re:Legacy file systems should be illegal (Score 1) 396

The problem is, neither ZFS or Btrfs would have stopped an arbitrary bit inside an arbitrary file from becoming corrupt....

I think you should have a look at this 10 year old blog post: https://blogs.oracle.com/elowe...
ZFS can use single and double-parity (like RAID5 with two parity drives, but no failure if power is pulled during writing). In addition, it has bit scrubbing where all data is verified regularly.

Submission + - The Government Can No Longer Track Your Cell Phone Without a Warrant 1

Jason Koebler writes: The government cannot use cell phone location data as evidence in a criminal proceeding without first obtaining a warrant, an appeals court ruled today, in one of the most important privacy decisions in recent memory.
"In short, we hold that cell site location information is within the subscriber’s reasonable expectation of privacy," the United States Court of Appeals for the Eleventh Circuit ruled. "The obtaining of that data without a warrant is a Fourth Amendment violation."

Comment Re:like those are hard to see on teh intarwebs (Score 1) 110

And these scumbags even register and hold for ransom domain names put into their domain search tool. That's right - search to see if a domain is available using the Godaddy site, and it will be registered by Godady themselves or "partners", and sold off to the highest bidder, or suddenly have a $500 asking price. http://www.billhartzer.com/pag...

Comment No good comments? Not a comment worthy article. (Score 1) 120

The linked article, which I did read, seems to have no thesis. It meanders from "C compilers can be subverted" to "see if people leave their purses out to judge if a neighborhood is safe". It is as if a high schooler had to write a paper on trust, and cut a paragraph out of each of the top 20 web search results.

Comment Re:Thankful for the FOSS drivers on older hardware (Score 1) 134

The open source driver needs to be good; the latest version of the ATI proprietary driver has dropped support for relatively new cards - anything before HD 5000 series. This means that cards that include very good h.264 decoding engines such as the AMD Radeon HD 3850 256MB reviewed can no longer use the latest driver. In Ubuntu 14.04 this also means that trying the older last-supporting driver version no longer works, one would need to downgrade the x server version used in the distro.

This is one of the few cases where hardware on Linux becomes "obsolete" far sooner than it should because of lacking manufacturer's driver support (as opposed to many hardware devices like gameports, scanners, and printers that lost their Windows support in Vista but continue working on Linux). This will make me more wary not of Linux, but of the manufacturers that pull such shenanigans.

Comment Re:Price a bit steep for lowest end platform (Score 1) 109

You can get an almost identically-specified Windows 8.1 Nokia Lumia 520 for $59.99, no contract. The only thing it's missing is a camera flash and a front-facing camera for video chats (Skype still works, it just points the wrong way.)

The latest developer rev of Windows Phone has word flow keyboard, which turns touch-screen typing from painfully intolerable to pretty cool.

Even Blackberry, giving it's Playbooks away to developers, couldn't get the adoption jump-started, so I don't know how an overpriced Firefox phone will succeed, although I would hope it would. Every other smartphone except for Blackberry wants to own your personal data and your life in their cloud and profit from everything sold in their store.

Slashdot Top Deals

"May your future be limited only by your dreams." -- Christa McAuliffe

Working...