Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:Back office (Score 1) 309

We encrypt using GPG at the DB extraction point so that when the file is sitting on the SFTP server in the DMZ waiting to go out it's not in cleartext. Also it allows us to sign the file and our partner can confirm that it's not been tampered with prior to them opening it in whatever trusted environment they process in. We need encryption at rest, as well as in transit, using GPG allows us to leave the 'transit' part up to the systems architects/developers because we know that whatever they do past db extraction is not reverent from a security pov.

Didn't get into it in the first post because I didn't think anyone would be interested :)
Min

Comment Back office (Score 4, Insightful) 309

I partially agree with Moxie, GPG/PGP as an email encryption standard is never going to reach the "my mother uses it" point of say Skype. That doesn't mean its run its course. I also think it's disingenuous to imply that the number of keys on the public key servers is a useful proxy for utilization rates.

In my company we use GPG every day. Most people who work there have no idea that we do. It's used in sensitive communications at high levels between organizations, e.g. to send documents to auditors. It's also used in a huge number of automated processes to encrypt data during the DB extract process so we can move that data out of the DB network and send it to partners.

We don't send those keys to a public keyshare. That would provide attackers information and we don't do that (ya, security through obscurity sucks if it's your only line of protection. If you're using it to make life just a bit more difficult for an attacker tho, well I'm always for that!)

Now all that having been said, I have great respect for Moxie, and maybe he has the Next Great Thing up his sleeve. I hope to see it at Defcon :).

Min

Comment Re:Competency (Score 1) 231

I have a few more examples - mostly because of situations I've been in over the years, and I know that the decisions get made today. Blind eyes get turned, "Oh dear, I appear to have left you way more drugs then required. Make sure they don't overdose on them." and then the death is ruled natural causes, all obvious evidence to the contrary.

I think overall this ruling is good, because it will remove the necessity for such "natural cause" deaths and ensure that the framework is followed instead. There's always going to be messy corner cases in law. There are people who get sentenced for murders they don't commit too. We can't ignore the problem because the solutions are going to be imperfect.

In the wake of this announcement there was someone who called into the local radio show. He said he had injected his loved one with a lethal dose of medication ("enough to kill a horse"). Imagine the guilt and suffering that person has gone through since, as they were unable to seek help, or therapy, etc, because what he did was technically speaking murder. We are not serving the greater good with the status quo.

The next step is for the competent government (federal most likely in this case, since the existing law is federal, although there's a non-zero chance that the feds might leave it up to the provinces through inaction) to take a stab at answering all the messy issues like "What does competent mean in this case". Then there will be court challenges, until we come up with a law that is acceptable within the Charter of Rights and Freedoms, and acceptable to the government(s) of the day. It's not pretty, but it is democracy.

Min

Comment Re:The Black Pill (Score 4, Informative) 231

when someone is incapable to decide

Just to point out - that was NOT the decision the court made. instead of paraphrasing I'll quote:

physicianâ'assisted death for a competent adult person who (1) clearly consents to the termination of life and (2) has a grievous and irremediable medical condition (including an illness, disease or disability) that causes enduring suffering that is intolerable to the individual in the circumstances of his or her condition.

Full judgement text available here

So the decision was not to allow doctors to make an arbitrary judgement on people who could not consent. The judgement was to prevent the government from finding doctors guilty of murder for respecting their patient's clearly expressed and competent wishes to end their lives only in circumstances of nonredeemable suffering.
Min

Comment Not the best candidate for an Ask Slashdot (Score 1) 700

This question isn't the best candidate for an ask Slashdot. The reason is that ANYTHING to do with raising kids is the equivilent of "Is Linux better then Windows" or "Iphone or Android, which should I pick? or "Ford or Honda?" for roughly the same reasons.

The group of people who have the source material you require to make your assessment have a deeply vested emotional commitment to the decision they have made. In this case what they did with their kids. So you're going to get emotional responses.

Additionally the KEY factor that we can't have any insight into is your kid(s). If there's one thing raising a kid has taught me it's that mine is a special snowflake, with all the positives and negitives that implies and I can't take decisions other parents have made for their kids and apply it to mine blindly outside of the most obvious cherry picked cases (e.g. vaccinations) My kid will react in a manner dictated by her personality.

For example, we've taken our kid to Defcon since she was 4. It's been a great experience for her and she self identifies with the type of kid who goes to a hacker conference and learns to solider and tell when someone is trying to social engineer her (a handy skill for your kid to have. Think puppies and vans). Is it the right thing for your kid? Who knows? Sure as heck not me. Do your research and find your answers, but do real research, don't ask on an internet forum :).

Min

Comment Re:Oh God, not again (Score 1) 740

it will be due to interacting with others while infected and contagious

But what of carriers (Typhoid Mary being the obvious example) and conditions where you can be contagious and asymptomatic? Proactive vaccination in these situations represent the effective only defense society has.

Also the premise assumes that every member of society has the time and ability to educate themselves as to the symptoms and contagious periods of each condition for which they choose not to vaccinate themselves and a willingness to self isolate when they experience these conditions. The current measles outbreak provides its own counterexample.

One of my sibling posters pointed out the example of society requiring vision correction to within an acceptable standard prior to allowing you to drive (this is Slashdot, always go with the car analogy!). That seems very apt. It is reasonable for society to impose certain restrictions upon your freedom in exchange for the privilege of being a participant. We call this trust. I trust that when I let my child play with your child that you will do a whole list of things, and one of those is that you will do your best to ensure my child is not exposed to life threatening conditions. I do everything in my power to ensure the opposite is true.

Funny story - when we went to get our child vaccinated, we had some questions. The "Oh no, not another one" look in our pediatrician's eye was amusing, as was the relief when it was confirmation that I wasn't at risk from catching Chicken Pox from the Chicken Pox vaccination since I've never had a confirmed case.

Min

Comment Re:LOL (Score 2) 98

So we'll see innovation in other places.

Take Plex for example. When I'm at home, on the wifi my plex client on my android phone downloads any subscribed content from my server. Then I have it in local storage till I watch it, when it's deleted.

Way better then over the LTE anyways, fewer dropouts. Sometimes adversity breeds innovation.

Min

Comment Re:its a tough subject (Score 5, Insightful) 673

Sure, over an evolutionary timespan. Assuming that the disease in question kill before you can give birth, and that they kill enough of the population to be impactful in an evolutionary sense.

Call me soft though, I'd prefer we solve this problem in something less then an evolutionary timescale. I kinda care about the kids who'd die otherwise.

Min

Comment Re:Absolutely fair.. (Score 4, Interesting) 114

Hrmm, this might work out well for us non-govt people.

Consider:

NSA: "Apple, you must let us 'review' your code. We'll keep our findings to ourselves, you can't tell anyone"
Apple: "OK"
NSA digs through code, finds exploits, locks them up for future weaponization ...
China: "Apple, we'd like to "review" your code. We're going to tell the world about it"
Apple: "OK"
NSA: "Crap, now those evyl Chinese will find our exploits. Darn, I guess we'd better tell Apple to fix them after all or the Chinese will be spying on us!

At the end of the day, the best we can hope for is that the various spooks keep each other honest.

Min

Comment Re:Time for the Ransomware (Score 1) 199

Sadly the relevant research shows that while you would like this to be the case, it isn't.

If you'd like to know more, look at the defcon conference videos for the last few years.

Just as a for example, I'll direct you to this article:

http://www.nytimes.com/2011/03...

There was also a talk this last year that went into the architectural design of the car's network, and showed that in most cases there was no device between the head end unit and the sensitive items in a car, and where there was it wasn't a security device, merely a signal management unit, and the presenter expected to be able to jump it. But again, typically if you get access to the bus, you can talk to anything you want. There was also a lovely bonus bit where they showed you could update the to an arbitrary unsigned firmware due to some sloppiness in the process. (if you cut the power at the right time, the recovery process didn't do the appropriate checks. Once they got in and could analyze the python scripts being used, they discovered if you wrote a specific character (I think D but my memory could be playing tricks on me) to the right sector of the CD, it would bypass the signature checks and just update the firmware.

Engineers are generally smart, but they also tend to design to the specifications. If you don't TELL them to consider an attacker in their designs, they don't.

Min

Comment Re:Time for the Ransomware (Score 1) 199

No need to do such extreme damage, when the same effect can be achieved with a simple fuse on the positive voltage line of the port. Suspicious activity? Burn the fuse-- BAM-- port is dead, but easily fixed.

Doesn't protect against other attack avenues that have either been hypothoized or demo'd though. The entertainment unit always seems popular. Trojaned CD in the player, for example or exploit against the bluetooth system. Hey I wonder what happens to that cute bit of software that displays what song the FM station is playing if the station sends YourPawnedxxxxxxxxxx....?

I'm not sure most of the security sector put it together that someone might voluntarily install their own remotely exploitable device into the bus in sufficient numbers to be interesting. Guess we should know better then to underestimate the power of a discount!

(I do agree with the rest of your post btw.)

Min

Comment Re:Time for the Ransomware (Score 4, Insightful) 199

Just as a point of interest, there was a talk at Defcon last year where someone built a IPS (intrusion prevention system) for the bus of the car. It turns out that the communication matrix for a car is a very static system. The parts of a car that communicate with each other do so often (e.g. Engine controller and injection system), and predictably. Other parts that don't (e.g. entertainment system, or that ODBII plug from the insurance company and the traction control system) never do. So it's possible to build a device that models the system by listening on the bus and if it suddenly sees new traffic patterns shorts out the bus, leaving you with a less smart, but still on 4 wheels and not careening into oncoming traffic, car.

Seems like something the OEMs should be looking into.

Min

Comment Re:some things for any judge to consider (Score 3, Interesting) 67

An open network connection at a security conference. That's either a honeypot or a freebie.

This. At the security conference I attend (defcon), assuming you got drunk enough to be dumb enough to connect an open hotspot, you'd be thanking your lucky stars if the worst that happened to you was getting on the wall of sheep (which is essentially the same stunt this guy pulled, with the information projected on a wall for everyone to see). I personally VPN *everything* during that week, and if I have to absolutely connect to a work system, I drive to a random McDs outside of the conference and do my VPNing from there (it's usually faster and more reliable then any network at the conference too, since it's not the prize in a big game of Spy vs Spy).

Min

Slashdot Top Deals

The Tao is like a glob pattern: used but never used up. It is like the extern void: filled with infinite possibilities.

Working...