Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Red herring arguments (Score 2) 397

I grew up in central New Jersey.

Deer are a MAJOR pest there:
1) No natural predators. The closest thing to a "natural predator" they have any more are cars.
2) No firearms hunting. The area is so built up that I believe even bow hunting needed exceptions from the normal rules (regarding proximity to residences) be made. Doesn't help that residences are where most of the food supply (landscaping) is, so it's hard to find deer that aren't too close to a house to shoot.
3) People dropping rocks out of windows probably wouldn't be effective enough for population control. (Although the deer are so docile and adjusted to human presence that this, in theory, would be a possible method for hunting deer.)

Comment Re:A lense cover (Score 1) 363

Yeah. There are third-party lens covers like GlassKap, but there are two problems:
1) They don't match Glass in color. So it keeps the tinfoilhatters (an honestly small but vocal and whiny part of the crowd) happier but to everyone else you look really silly. (Yes, there are some that will say you'll always look silly with Glass - but it looks far sillier with a GlassKap on due to the color mismatch.)
2) Google put the light sensor for the device in the camera hole. So with GlassKap, Glass thinks you're always in a dark room and dims the display. :( (I wish I could get a version of http://www.shapeways.com/model... that didn't have the display shield component - I'd put a translucent cover over the camera hole.)

Comment Re:Who's behind that back-door ? (Score 3, Insightful) 81

"Never attribute to malice that which can be attributed to stupidity."

My guess, after years of working with Samsung's poor-quality platform software and multiple runins with their utterly piss-poor configuration management processes (as in, the Korean divisions at Samsung Mobile don't seem to have any, as evidenced by numerous situations during the Superbrick fiasco):

Samsung probably put this into the RIL library to facilitate modem debugging. e.g. the modem can read/write to /efs/root/ in order to make it easier for a developer to track state changes of the modem or whatever. (Why do this instead of using whatever debugging functions are built into the modem such as maybe JTAG? This is probably for late-stage development where they wanted to test finishing touches on the modem using final hardware and the modem's debugging functions weren't physically available.)

Keep in mind that, based on the reverse engineering effort, Samsung *intended* this feature to only access files within /efs/root/ - the EFS partition is specifically reserved for device-specific state and calibration data (most notably the phone's IMEI is stored in the EFS partition, and with the exception of some miscellaneous other config data such as MAC addresses for wifi and BT, it's almost entirely for modem-related items. I may be wrong about the MAC data, I'm a bit rusty and haven't poked around at my EFS partitions in a long time.) It's only due to a screwup (lack of sanitization of escape sequences such as ../../ ) that someone can in theory access files outside of /efs/root

So at some point, Samsung probably removed the corresponding components on the baseband firmware side (no one has yet to confirm anything on the modem side that sends these commands, nor has anyone caught any of these commands being issued - the behavior of the library was verified by injecting extra commands with a kernel patch in the driver between the modem and the library), but someone forgot to remove them from the RIL library on the applications processor side. Forgetting to remove dead code and/or leaving epic security holes in place (remember that in late 2012, someone realized that Samsung left a world readable/writable device node that effectively mapped all system memory to that device file - allowing anyone to read or write any part of memory. For more, do a Google search for "exynos-abuse" ) is pretty typical for Samsung.

As to my experience here - I was one of the Cyanogenmod maintainers for the Exynos 4210 (I9100, I777, N7000) handset family, and also did some work on 4412 devices (primarily the Note 10.1 - GT-N8013) throughout 2012 and the first half of 2013. I'm 90% retired from working with Haxxinos these days and was (along with the majority of the rest of the Exynos maintainers) one of the people who left the project to start Omni after the Focal relicensing attempt fiasco.

An interesting question is - what architecture is the XMM626x's baseband processor? Is it custom or an ARM variant making it easier to analyze the baseband firmware itself? More than two years of working with that family of devices and I never personally looked in detail at what was running on the baseband side.

Comment Re:Fine, if and only if it can be turned off. (Score 1) 158

Yup. There are plenty of "opt-in" solutions to mobile device management right now.

Thing is, I know of none that can completely brick a device after a wipe, and I have grave concerns over such a capability because of the damage it does if it accidentally goes off. If it can't completely brick a device, at best it can protect your data but not the smartphone itself.

The thing is, there are already solutions for smartphone theft. A smartphone, to be fully useful, needs service from a wireless carrier. To get service, a device must report its IMEI or ESN. IMEI/ESN blacklists already exist and are in use today.

Comment One issue (Score 1) 134

"Hacking was encouraged—users and developers were told they could root the console without voiding its warranty."

Problem was that it came out early that this wasn't a particularly "hackable" console due to some design flaws.
1) If you're doing platform-level hacking, Tegra3 is not a pleasant chipset to work with
2) It had some issues as I understand it with fastboot mode (I don't recall the exact details, but it either was extremely difficult to enter or simply didn't exist) - as a result it was very easy to brick the Ouya. The news of this drove away quite a lot of the potential enthusiast/power users.

Comment Re:That's a great plan... (Score 1) 197

Yup. The carriers already HAVE an effective killswitch: A database of IMEIs reported as stolen which the network can (and DOES) blacklist. (I know for a fact that AT&T does blacklisting as Samsung devices change to a "default" test IMEI if their EFS partition is corrupted - this IMEI is blacklisted by AT&T.)

If users want something more than that they have plenty of options available to them at their own risk.

Slashdot Top Deals

Always draw your curves, then plot your reading.

Working...