Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Doable (Score 2) 324

Actually, writing a verification firmware is possible (assuming, that it was written after attacking code was written and writer was not NSLed)
Simply because attack code doesn't know what output verification code must produce. It either must execute new code (will be busted) or not (will be busted). Putting a full blown interpreter (or some trap mechanism on flash access) will screw timing - again it will be busted.

Comment it's hard to find trustworthy reviewers these days (Score 1) 120

I think Apple's unwillingness to admit their bugs, dishonest reviewers and apple's fanboys happily squashing all discontent on message boards etc. combined creating a situation when people simply refuse to upgrade/patch their apple gear.

I mean look, when I first upgraded my perfectly nice iPad Air to iOS 8, it's Wi-Fi become practically unusable (had to reconnect every 5 minutes). Rendering iPad useless for several weeks. And it's not like I didn't check online reviews beforehand... None of them (sellouts!) mentioned this shit. Only _after_ I knew what's wrong with the update I was able to find those huge message board threads full of pissed-off users wenting.

Now, with the new update for iOS 8 I'm sitting this one out. Or at least waiting until other people upgraded and google got the message indexed so I can find it...

Comment Re:Won't work (Score 1) 426

Interesting. But (I'm not an expert though) it might be that one cannot mothball those things for very long - you pump it or you lose it.

Additionally, even if it does not work for already producing assets, it as sure as hell will clamp down on new investments. And, maybe, that is just good enough of an outcome.

Slashdot Top Deals

This restaurant was advertising breakfast any time. So I ordered french toast in the renaissance. - Steven Wright, comedian

Working...