Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment If this happened in the US (Score 1) 378

If this were a couple of kids in the US... they would both be on their way to Gitmo, the anti-rejection drugs the kid probably needs to stay alive wouldn't be addressed... then the remaining kid would probably go on a hunger strike in Solitary.

Oh... and someone at the Bank would be put in charge of a new "cyber security" division, with a big bonus and a corner office.

I wish we could be more like Canada some times.

Comment Re:"Coming IT Nightmare?!?" (Score 1) 240

That doesn't address the issue of unintended side effects from existing bugs. I agree that a separate LAN can help mitigate things, but it doesn't eliminate the odd things that can happen in a world where code is trusted by default.

Imagine if your garage light switch would 1 out of every 1000,000 times, cause your roof to fall off your house.... this is the world of software that can do anything.

Comment Trusted by default - right phrase, wrong context (Score 1) 240

The problem IS that things are trusted by default... but not in the way the author thought. If you trust every program you run by default, you are doomed. An operating system should NEVER trust anything by default... Linux, Windows, OSX all violate this principle. So do embedded devices base on some variant of them.

Never trust by default, and you stop having to worry about side-effects, and start deciding what the limits are ahead of time.

Comment Progress IS being made (Score 1) 187

I sit here in the Cassandra suite, watching the tech community finally waking up to the reality of the world. You are starting to panic because you know none of the operating system choices you have are viable for truly secure systems. Soon you will learn about Multi-Level Secure systems, Capabilities, and other features of the secure computing..

About 10 years from now, you'll get the hints the universe has dropped on you, and start implementing these systems.

About 10 years after that, some real old timers (or young punks who've read history) will point out that this stuff was actually figured out in the late 1960s, and early 1970s.

Comment Re:Multi-Level Security? (Score 3, Interesting) 22

Multi-Level Security was worked out in the late 1960s in order to allow computing both Secret and "Top Secret" information in the same computer at the same time. The use of the Bell-LaPadula model ensures that a lesser privileged user can never cause grief for a more privileged user. If we had Mutli-Level secure systems, we could safely run any program we want in a sandbox, and it could never, ever crawl back out of it.

The closest you're likely to approach is if you enable the MAC option in FreeBSD, which is experimental.

The Genode project aims to provide a capability based security system which can run Linux Apps... it is the best chance I see going forward for a truly secure system that isn't military grade. In such systems, you specify at run time exactly which files can be accessed by an application. This has the benefit of explicitly limiting the side effects of said application, and thus making for a far more secure system. You might be tempted to think this would make it unusable (as App-Armour tends to be)... but it doesn't have to be that way. In fact, it's possible to make apps behave almost identically, as far as the user is concerned, without compromising anything.

I think we're still 10 years out before people wake up and realize that our collective assumptions about computer security are wrong, and this needs a more rigorous, carefully engineered solution, instead of the layers of patch we currently employ. I'm hoping that my frequent postings on this subject are informative, and help shorten that timespan significantly.

Comment Re:It never ceases to amaze me... (Score 1) 345

Amen!

I just "upgraded" some Windows 7 machines to IE8 (from IE10) because that is the standard the automobile industry has settled on.

Linux is not any more secure than Windows in the long run... its not a multi-level secure system, nor is any other choice you've ever heard of. Until we adopt something like the Bell-LaPadula security model, we're going to be chasing our collective tails, and this is going to be happening for years!

Science

'Accidental' Siberian Mummies Part of Mysterious Ancient Arctic Civilization 34

concertina226 (2447056) writes "Russian archaeologists are trying to discover the origins of a group of 800-year-old bodies found just 29 km from the Arctic Circle, which were accidentally mummified by copper when they were buried. The mummies were discovered at Zeleniy Yar in Siberia, in 34 shallow graves, and 11 of the bodies found in the medieval burial place had either smashed skeletons or missing and shattered skulls. They may have been damaged by their peers deliberately to prevent spells emanating from them. There is only one female, a child, who is buried with her face masked by copper plates, and three male infant mummies, who wear copper masks and were bound in four or five copper hoops that each measure several centimetres wide."
NASA

NASA Proposes "Water World" Theory For Origin of Life 115

William Robinson (875390) writes "A new study from researchers at Nasa's Jet Propulsion Laboratory has proposed the "water world" theory as the answer to our evolution, which describes how electrical energy naturally produced at the sea floor might have given rise to life. While the scientists had already proposed this hypothesis called 'submarine alkaline hydrothermal emergence of life' the new report assembles decades of field, laboratory and theoretical research into a grand, unified picture."
Transportation

An Engineer's Eureka Moment With a GM Flaw 357

theodp (442580) writes "Hired by the family of Brooke Melton in their wrongful-death lawsuit against GM, engineer Mark Hood was at a loss to explain why the engine in Melton's 2005 Chevy Cobalt had suddenly shut off, causing her fatal accident in 2010. Hood had photographed, X-rayed and disassembled the two-inch ignition switch, focusing on the tiny plastic and metal switch that controlled the ignition, but it wasn't until he bought a replacement for $30 from a local GM dealership that the mystery quickly unraveled. Eyeing the old and new parts, Hood quickly figured out a problem now linked to 13 deaths that GM had known about for a decade. Even though the new switch had the same identification number — 10392423 — Hood found big differences — a tiny metal plunger in the switch was longer in the replacement part, the switch's spring was more compressed, and most importantly, the force needed to turn the ignition on and off was greater. 'It's satisfying to me because I'm working on behalf of the Meltons,' Hood said. 'It won't bring their daughter back, but if it goes toward a better understanding of the problem, it might save someone else.' Next week, GM CEO Mary Barra will testify before Congress about events leading up to the wide-ranging recall of 2.6 million vehicles."

Comment Re:Jobs (Score 1) 506

The InterNet was created because the guy in charge of things didn't want a teletype in his office for each and every machine he could access. A network to access all of them, and a single terminal made more sense.

It had NOTHING to do with nuclear war, or reliability, at first.

Slashdot Top Deals

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...