Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Submission + - Netflix Stealthy Reduces Service, Keeps Prices the Same

Nom du Keyboard writes: After seeing a drop in my DVD service from Netflix I got a customer service representative tonight to confirm that Netflix has ceased processing DVD returns on Saturdays nationwide. And that they did this without either notifying their customers, nor reducing prices to compensate for the reduced service. Given that the DVD selection still far outstrips their streaming selection, this may be news to others like myself who don't find streaming an adequate replacement for plastic discs. My experience up until recently, unlike Netflix's promise of a 1-3 day turnaround at their end which gives them lots of wiggle room to degrade service even further, had been of mailing in a DVD on day one, having them receive it and mail out my next selection on day two, and receiving it on day three. Now with them only working 5 days and many US Post Office holidays, they're still getting the same money for significantly less. Is Netflix still the good guy here?

Submission + - Russia shows proof of warplanes In MH17 vicinity,demands answers from US/Kiev (zerohedge.com)

An anonymous reader writes: Ukraine hasn’t said how it immediately knew rebels downed Malaysian plane, notes the Russian Foreign Ministry, as it unveils 10 awkward questions for Ukraine (and perhaps the US 'snap judgment') to answer about the MH17 disaster. However, what is perhaps more concerning for the hordes of finger-pointers is that:
[1] Russia has images of Ukraine deploying BUK rockets in east
[2] Ukraine moved BUK near rebels in Donetsk on July 17th
[3] Russia detected Ukrainian fighter jet pick up speed toward MH17

Aside from the fake YouTube clips, these would deal another unpleasant blow to US foreign policy.

Submission + - Members of previously uncontacted tribe infected with flu (sciencemag.org)

sciencehabit writes: Brazil’s Indian affairs department has announced an event that many anthropologists and medical researchers had feared. In the remote Brazilian state of Acre, members of a long-isolated Amazon tribe have contracted influenza after making voluntary contact with the outside world a few weeks ago. Some researchers now fear that the contacted individuals will spread the potentially fatal virus to other nonimmunized members of their tribe.

Submission + - "Canvas Fingerprinting" Online Tracking Difficult To Block (propublica.org)

globaljustin writes: First documented in a forthcoming paper by researchers at Princeton University and KU Leuven University in Belgium, this type of tracking, called canvas fingerprinting, works by instructing the visitor’s Web browser to draw a hidden image. Because each computer draws the image slightly differently, the images can be used to assign each user’s device a number that uniquely identifies it.

[The] fingerprints are unusually hard to block: They can’t be prevented by using standard Web browser privacy settings or using anti-tracking tools such as AdBlock Plus.

The researchers found canvas fingerprinting computer code, primarily written by a company called AddThis, on 5 percent of the top 100,000 websites.

Submission + - Researcher Finds Hidden Data-Dumping Services in iOS

Trailrunner7 writes: There are a number of undocumented and hidden features and services in Apple iOS that can be used to bypass the backup encryption on iOS devices and remove large amounts of users’ personal data. Several of these features began as benign services but have evolved in recent years to become powerful tools for acquiring user data.

Jonathan Zdziarski, a forensic scientist and researcher who has worked extensively with law enforcement and intelligence agencies, has spent quite a bit of time looking at the capabilities and services available in iOS for data acquisition and found that some of the services have no real reason to be on these devices and that several have the ability to bypass the iOS backup encryption. One of the services in iOS, called mobile file_relay, can be accessed remotely or through a USB connection can be used to bypass the backup encryption. If the device has not been rebooted since the last time the user entered the PIN, all of the data encrypted via data protection can be accessed, whether by an attacker or law enforcement, Zdziarski said.

Zdziarski discussed his findings in a talk at the HOPE X conference recently and published the slides and paper, as well. The file_relay service has been in iOS for some time and originally was benign, but Zdziarski said that in recent versions it has turned into a tool that can dump loads of user data on command. The file_relay tool can dump a list of the email and social media accounts, the address book, the user cache folder, which contains screenshots, offline content, copy/paste data, keyboard typing cache and other personal data. The tool can also provide a log of periodic location snapshots from the device.

Comment Re:"Develop" or "Instigate the development of"? (Score 1) 129

Nothing I have read about Snowden indicates that he is actually some sort of uber-hacker

Except the stuff about how a 29 year old completely pwnd the NSA, probably the most technically sophisticated part of the US Government there is?

Sheesh. Your standards are high. What would it take, exactly?

Additionally, just because you have read nothing about his programming skills doesn't mean he has none. He once mentioned finding XSS holes in some CIA app so apparently he is good enough to do that.

Comment Re:New SSL root certificate authority (Score 1) 129

There are already plenty of CA's in countries that are not under US jurisdiction. However, so far the CA's that issued bad certs were all outside the USA, and appear to have only done so because they got hacked and not because they were e.g. forced to by court order.

Unless you have a magical solution to hacking I don't think your new root CA would solve much.

Additionally, citation needed for "routine man in the middle". SSL MITM has been studied by academics at scale. They did not find evidence of much. Governments don't need to MITM SSL for as long as users browse non-SSLd sites like Slashdot and browser exploits exist.

Submission + - MIT's Ted Postol presents more evidence on Iron Dome failures (thebulletin.org) 1

Lasrick writes: In a controversial article last week, MIT physicist Ted Postol again questioned whether Israel's vaunted Iron Dome rocket defense system actually works. This week, he comes back with evidence in the form of diagrams, photos of Iron Dome intercepts and contrails, and evidence on the ground to show that Iron Dome in fact is effective only about 5% of the time. Postol believes the real reason there are so few Israeli casualties is that Hamas rockets have very small warheads (only 10 to 20 pounds), and also Israel's outstanding civil defense system, which includes a vast system of shelters and an incredibly sophisticated rocket attack warning system (delivered through smart phones, among other ways).

Submission + - No RIF'd Employees Need Apply for Microsoft External Staff Jobs for 6 Months 1

theodp writes: So, what does Microsoft do for an encore after laying off 18,000 employees with a hilariously bad memo? Issue another bad memo — Changes to Microsoft Network and Building Access for External Staff — "to introduce a new policy [retroactive to July 1] that will better protect our Microsoft IP and confidential information." How so? "The policy change affects [only] US-based external staff (including Agency Temporaries, Vendors and Business Guests)," Microsoft adds, "and limits their access to Microsoft buildings and the Microsoft corporate network to a period of 18 months, with a required six-month break before access may be granted again." Suppose Microsoft feels that's where the NSA went wrong with Edward Snowden? And if any soon-to-be-terminated Microsoft employees hope to latch on to a job with a Microsoft external vendor to keep their income flowing, they best think again. "Any Microsoft employee who separated from Microsoft on or after July 1, 2014," the kick-em-while-they're-down memo explains, "will be required to take a minimum 6-month break from access between the day the employee separates from Microsoft and the date when the former employee may begin an assignment as an External Staff performing services for Microsoft."

Comment Re:lol (Score 0) 667

try googletranslating http://lb.ua/news/2014/07/20/2... [lb.ua] - ukrainian army detains 23 terrorists. somehow all 23 turn out to be citizens of the russian federation.

That page is merely reporting a press release from the Ukrainian government in Kiev. Are you suggesting we should treat everything they say as factually true?

let's bisect the other thing you said - "at most Russia is supplying weapons to them".
"at most". as if they were given bows and arrows. they get armoured vehicles. they get... tanks. they get bloody sam systems that can reach targets up to 25km.

Yes. That's what I said. Perhaps this is a language issue.

Whatever is happening in Ukraine it is not a full-blown invasion by Russia in the "classical" style that Iraq or Afghanistan were. That would be far more obvious. It seems to be much more similar to what's been happening in Syria where the west has been supplying weapons, training and expertise to anti-Assad groups there. If you were to say the west has "at most been supplying weapons and training to the Syrian rebels" you would be correct, given that (fortunately) Syria was not invaded by a foreign army.

Comment Re:lol (Score -1, Troll) 667

Not exactly. There is a distinct difference between a soldier and a combatant. A soldier is trained and is a member of a standing military. The separatists can at best be described as "irregulars", or insurgents or rebels if you want to go with slightly more charged terminology.

Yes, really? With that definition it'd be impossible for a new military to ever be created, because anyone who joins and fights with one is not joining a standing army therefore cannot be soldiers. That is obviously nonsense, it must be possible for someone to be a soldier in a newly formed army, which is what it looks like is happening here.

Additionally, you claim that the fighters in Donetsk cannot be soldiers because soldiers are trained, and then immediately claim they're receiving training from Russia. So which is it?

And given the fact that the missiles were launched from inside territory controlled by the rebelsis a very important detail. Why would the Ukrainians have anti-air equipment deployed in an area they do not control, against an enemy with no air power?

You're quite right - it probably was the separatists. This does not change the accuracy of the Wikipedia edit that's being discussed, because unless/until the separatists win, they are still Ukrainians.

Although I'd note that given the amount of bullshit emanating from all sides in this conflict it's hard to really know anything about what's going on. The area of Ukraine that's in revolt is next to the Russian border, which is exactly where you'd expect the Ukrainian military to have had lots of soldiers and equipment stationed. Missiles might have been trucked over the Russian border, or they might simply have been there already. The separatists might be being trained by Russians (this would be unsurprising and not exactly unprecedented - see how the USA supported rebels in Syria), or alternatively they might be operating the equipment without really knowing what they're doing - indeed, having no clue what you're targeting would be rather indicative of not being properly trained, no? Or perhaps they're being trained by people who are ethnically Russian but lived in Ukraine at the time of the rebellion, or one of many other more complex cases that won't neatly fit into the "Putin fired the missiles himself" story the west is busy pushing.

All we can say for sure is that whatever you read about this incident is going to be full-blown propaganda, and should be treated as such.

Comment lol (Score -1) 667

I don't think Russian state media should be editing Wikipedia entries especially not on matters of current affairs.

But still, interpreted literally the new statement is far more factually correct and unbiased than what it replaced. Whoever shot down the plane, they were "soldiers" or fighters of some variety and almost certainly can be described as Ukrainian, given that everyone seems to agree that the fighters are actually eastern Ukrainians and at most Russia is supplying weapons to them.

The original text, on the other hand, more or less exactly sums up western/west Ukrainian line despite the obvious abuse of the word terrorist to mean "rebel fighter" and the [citation needed] assertion about who did it and the source of the weapons.

User Journal

Journal Journal: Nobots Chapter Thirty Three 2

Coffee
An alarm woke me up at quarter after six. What the hell? Fire in P117? I put on a robe, and as I trudged down there Tammy was running into the commons. I wondered what was going on.
I got to Passenger quarters 117 and it was a damned drill, the light wasn't flashing and I didn't smell any smoke. I really didn't expect to, because except for Tammy's quarters none of the rest of the passenger section was occupied and

Comment Re:Time to get rid of Tor (Score 3, Interesting) 122

There is no need to get rid of Tor: in theory, Tor could have a "hidden service policy" mechanism not much different to the exit policy mechanism. HS Policies would allow a node operator to state that they aren't willing to act as an introduction point for a list of hidden services (or point to lists maintained elsewhere to stop fast-flux type behaviour).

Tor already accepts that not all relay operators will want to support all kinds of behaviour and that some kinds of traffic can be abusive, that's why they implement exit policies which allow exits to ban port and IP ranges. Taking this philosophy to hidden services seems like the next natural step. After all, Tor volunteers are ultimately acting as human shields for other people's anonymous behaviour. Requiring them to shield everything just restricts the number of people who would be willing to donate bandwidth to general privacy but are not interested in enabling botnets.

Comment Re:This obsession with everything in RAM needs to (Score 2) 161

Not sure what you're getting at, but the Azul collector is well known for pulling off apparently magical GC performance. They do it with a lot of very clever computer science that involves, amongst other things, modifications to the kernel. I believe they also used to use custom chips with extended instruction sets designed to interop well with their custom JVM. Not sure if they still do that. The result is that they can do things like GC a 20 gigabyte heap in a handful of milliseconds. GC doesn't have to suck.

Slashdot Top Deals

Always draw your curves, then plot your reading.

Working...