Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Don't assume your phone is secure (Score 1) 45

Don't assume your typical non-military-grade-hardened phone is secure unless it's so-dumb-that-its-unhackable* or the phone resides on an isolated network over which you and only people you trust can see.

Even if nobody knows how to compromise it today, you shouldn't assume someone won't figure out how to compromise it "tomorrow".

* think "analog phone on a cross-bar switch" - but even that is subject to hacking, but few people have the skills to do more than a simple wiretap.

Comment This can kill a career (Score 1) 765

Many years ago we had a system admin who used sexual innuendo in root passwords on our non-production research equipment. Thankfully, only a handful of people ever used these machines and they were all in our department.

Within months of my arrival, he was laid off. His skills weren't great but they were good enough to keep him above the "layoff bubble." I have a strong hunch that his sexist style made it easy for his boss to decide to get rid of him.

The new passwords didn't have any sexual innuendo.

At the time, we were a small branch of a research arm of a large corporation. Personally, I found his willingness to use such innuendo on the job distasteful and I found having to type them in on a routine basis uncomfortable but not so much that it was enough to complain about. Now that I am many years wiser and aware of the larger effects that tolerating such behavior has on the workplace, recruitment, and retention, I would probably either ask him to change the passwords or raise the issue with his/our boss.

Comment Penalty for disobeying customs rules (Score 1) 200

For non-citizens and others without an automatic right to entry, the penalty for disobeying directives from customs agents for those violating "border-only" rules (i.e. not rules that apply inside the country such as assaulting a government official) should be denial of entry.

For citizens and others with an automatic right to entry, the person should be given a choice: Voluntarily go back and come back another time when they are willing to obey the rules, or be arrested/cited for violating whatever law they broke.

Comment Don't ship, send an employee-courier (Score 3, Insightful) 296

If it's THAT sensitive, either have the customer pick it up from a Cisco-controlled location or have a Cisco employee hand-deliver it to the customer.

Use tamper-evident seals and use something like a "warrant canary"-like system so the delivery person can effectively tell the customer that to the best of his and Cisco's knowledge the shipment was not tampered with en route: The absence of a followup message from Cisco guaranteeing that the shipment and delivery were not intercepted would be treated as a message that it might have been intercepted.

Speaking of "canaries" I wouldn't be surprised to see specialty shipping companies or specialty-arms of big-name shipping companies use "canaries" to guarantee that their shipments were delivered to an authorized person and not tampered with en route.

Comment We need a "pre-EUFI" unflashable firmware (Score 1) 120

I don't have a problem with EUFI or BIOS being flashable. But you need a non-changeable way of recovering your system to prevent "permanent" p0wnership or brickage.

A non-flashable "pre-EUFI" firmware that did nothing but check if a certain jumper pin was set and either proceed to boot to EUFI or boot to a non-flashable "EUFI re-flash loader" utility is a must for any computer that doesn't need to be "locked down" at the factory. This utility would look in a standard location - perhaps USB port 1 - for a signed executable that would be the real "re-flash" utility. Whether motherboard vendors chose to supply signed re-flash utilities that only re-flashed signed EUFI binaries or if they catered to hobbyists who might want to load arbitrary/unsigned EUFI binaries would be up to the motherboard manufacturer.

Bonus points if the immutable "EUFI re-flash loader" utility calculated and displayed a cryptographic hash of both the current EUFI and that of the real "re-flash" utility the user is trying to use PRIOR to executing it the so the user could verify that they are what he thinks they are.

For computers running in specific environments that need to be "locked down" at the factory, re-flashing the BIOS would probably not be allowed at all - EUFI changes would probably require chip- or motherboard-level surgery.

Comment Film plus... (Score 1) 169

Color-stable archival film with color-stable archival prints in case the film isn't as color-stable as you hope. If you can do a second film conversion using a different type of film that would be good also. If this was for more than 100 years I would also suggest color-separations done on archival black-and-white film.

For audio, do on-film audio, a phonograph record on archival materials, and an analog magnetic tape using a recording mode that was in common use for decades, on archival materials.

In addition, I would supply DVDs on archival material, a rugged DVD player likely to still be playable in 100 years, a printed copy of the manual and a printed copy of the DVD specification, all on archival paper. If space precludes the use of printed manuals, a micfofilm copy is fine, just put it on archival materials.

Submission + - India bans rape documentary, BBC will air it tonight

davidwr writes: In a classic case of the Streisand effect, BBC4 will move up its scheduled broadcast of India's Daughter to 10PM Wednesday night after it was banned in India. It was originally scheduled to air this Sunday, which is International Women's Day. "The move was made after Indian authorities banned the domestic broadcast of the film and said they were also trying to prevent it from being shown worldwide."

The film is about the brutal 2012 gang rape of Jyoti Singh, a 23-year old student.

Yes, I realize that Slashdot is "news for nerds" but the attempted worldwide censorship by India and BBC4's response should strike a chord with many /. readers.

Comment So... (Score 1) 178

So, what if I and everyone else who accepts BC for payment said "before we accept your coin, we need to run its complete history against known coin thefts"?

That wouldn't necessarily stop "off-blockchain" transactions like people who trade whole wallets or who "print coins out on paper" and trade them, but it might slow it down if people knew that they might be the one stuck "holding the dirty money."

There is still the problem that this alone won't prevent people from spending stolen BC before it is reported. In order to fix that, you will need some accepted means of "de-valuing" any money that was ever "co-mingled" with "dirty money." People other than the original thief would be forced to absorb the loss but at least once the loss was reported, I could accept your "partly dirty money" after applying a discount to it to reflect the "non-dirty" portion of its value. I wrote a top-level reply to this article outlining this in more detail.

Comment Check the blockchain (Score 1) 178

I thought the point of the blockchain was that it recorded every transaction.

I have no idea if it's practical, but in principle, it should be possible to trace the coins from a known point in time, taking into account the "dilution" when they are mixed with other coins.

In other words, if you give me your entire wallet consisting of 1BC that is later determined to be "dirty money" (as declared by the police/a court/whomever) and I put it in my wallet consisting of 9 other BC, my wallet is now "10% contaminated" by the "dirty money."

If I then I give 1BC each to 10 other people who have wallets with 9BC in them, those 10 people each have wallets that are "1% contaminated" by the original "dirty money".

If they each add 90 BC to their wallets, they will each have wallets with 100BC that are now "merely 0.1% contaminated" by the "dirty money."

And so on.

But you will know "where the money went."

As I said, this should be doable in principle. As to whether it is doable in practice I have no idea.

If this kind of tracing is doable in practice, then it can be used to reduce the occurrence of coin theft by reporting thefts to a central authority (or even logging the theft in the block-chain itself) and having people who accept BC as payment treat coins that have been stolen as worthless and treat those that have been co-mingled with stolen coins in "upstream" transactions as having only a "fractional" value based on the "non-dirty" portion of its transaction history.

Yes, there will be thefts but the crook will have to pass the dirty money off on to some innocent/naive party quickly, before the coins are reported stolen. Whoever has the coins or a wallet that was contaminated by having the coins used in an upstream transaction at the time that the theft is reported will typically be stuck with the loss, but from that point on the coins can be used at a "fair" value, based on the value of the non-stolen portion of the money. Depending on the legal frameworks in place and whether the party who gave them the contaminated BC can be identified, they may be totally out of luck or they may be able to recoup the loss from their own counter-party or an insurance company. If they are able t recoup from the counter-party, he will either be stuck with the loss or he may be able to recoup it from the party who gave him contaminated coins or his insurance company, and so on.

Of course, there is the possibility of fraudulently reporting money as stolen. To prevent this, it is doubtful that any reporting system that didn't include some form of accountability for lying would be feasible. I can't think of any way of doing this besides requiring people to reveal their real-life identity and real-world address to the police or other "authority" so that if it turns out they are lying, they can be prosecuted for perjury.

Oh, before you ask, yes, I do realize that this would increase the complexity of handling BC transactions significantly and that alone may make such a system impractical, at least for now.

Comment Re:Improving crap code (Score 1) 247

If you misunderstood my to mean "gold, the relatively inert chemical element used for teeth fillings, expensive paperweights, electrical circuits, and as a financial hedge against inflation" then I take your point.

If you understood me correctly to mean "high quality code" then I don't understand your comment, please elaborate.

Slashdot Top Deals

E = MC ** 2 +- 3db

Working...