Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:Cookies and referers (Score 2) 158

I'll always register a new account (usually easy enough) if I really want - too worried about such sites snooping my passwords.

When you use a federated single-sign-on capability like this, your password is NEVER sent to the service provider (the one you're logging in to using you Yahoo/Facebook/Google/etc account). It is only sent to the authenticating service (the identity provider), who already has it, and then that provider generates a signed message in a specific format (OpenID, SAML, etc) that vouches for your identity to the other site. In this model, your password is actually exposed LESS than if you create an account at the site in question.

Comment Re:Cookies and referers (Score 1) 158

basic security 101 just says that you don't trust another site with the keys to your kingdom... especially with zero assurance that it might even work.

If the other site can handle proper authentication of the user, secure storage of credentials using a suitable hash algorithm and a good amount of salt, and generally follows all of the best practices associated with these functions, and can provided federated single-sign-on using a mature, tested, and generally accepted protocol like OpenID or OAuth, then you absolutely says that you can trust another site to provide your authentication function for you. Well, maybe you can, depending on your business model and risk tolerance. Whatever you decided, I *highly* doubt that you can securely and safely store your users' credential information in a more secure manner than Facebook can.

Comment Re:unix permissions? (Score 1) 184

The Unix permissions model that is part of the Linux kernel within Android is used extensively and is central to application isolation within Android. It's just not used as you think it is. Each app runs under its own UID and each app has full permission to its own directories and resources (owner has full control) while no other apps have any permissions to those resources (by default, this can be changed by the app's developers and by you, assuming you have root-level access to your phone).

Comment Re:has no user-replaceable parts at all (Score 4, Informative) 914

The right thing to do is...

...always a matter of perspective. The iPod (and a lot of Apple's devices) offers a far superior interface and experience for the vast majority of users. If my mom buys an iPod and it breaks and she's upset, I will argue that the "right thing" for me to since, since I have the capabilities to fix it would be to do so. By doing so, I increase my mom's happiness, I get to undertake a fun little technical challenge, and both me and my mom are happy. If instead, I "guide" her to buying a user-serviceable device that she hates to use due to an inferior interface from her perspective, then she's lost money, doesn't have a device she likes, and she's mad at me. I cannot see how that would be the right thing to do.

Comment Re:Unsalted hashes are worse. (Score 5, Informative) 212

It will slow down brute force **for a particular password**. That's the key. If you don't use salt, you can brute force all you want and, for each attempt, check to see if that result is there for ANY of the passwords. If you use salt, since you would be using different salt for each password (or...you should be!), then you need to brute force each password individually.

Comment Re:Congratulations, Verizon (Score 1) 331

Verizon is ... CDMA, CDMA2000 (3G), and LTE (4G). If you're using CDMA (2G data), then your phone most likely does not have a SIM. If you're using CDMA2000 (3G) and you have a US-only phone, then your phone does not have a SIM, but if you have a world-capable phone, it does (the Blackberry Storm, for example, used the internal CDMA2000 radio when in the US and then also had a GSM radio with a SIM for when it was out of the US). If you're using LTE (4G), then you do have a SIM as LTE is a technology that is derived from the GSM-line of technologies as opposed to the CDMA ones (and, yes, Verizon uses LTE).

Comment Re:Source Code? (Score 5, Informative) 97

Different languages compile down very differently. Indeed, different compilers compile the same source code differently (try comparing GCC output to Visual Studio output and you'll see some obvious differences in how the assembly/machine code is crafted). In this case, there were clear signs of an object-oriented approach (data and functions were located around each other in memory, which is not likely to happen in non-OO languages, etc).

Slashdot Top Deals

Stellar rays prove fibbing never pays. Embezzlement is another matter.

Working...