Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Battery Manufacturers (Score 0) 613

You do realize that Daylight Savings Time was created by battery manufacturers in a bid to sell more 9V batteries. They have used tried and true FUD tactics to scare the sheeple into replacing the batteries in their smoke detectors unnecessarily. It worked well too. Battery sales, specifically 9V batteries, increased 38.3% the year Daylight Savings Time was introduced.

Comment Not for the user's benefit (Score 1) 631

CurrentC is not for the user's benefit. It's for the merchant's benefit so that they can avoid the fees that MC/Visa charge them for handling the transaction. I don't see anything in this deal that benefits the consumer. For example, you will no longer have any charge back protection. If the item you purchased turns out to be a brick in a box you will be at the merchant's mercy to transfer the funds back into your account at some point. Meanwhile that money is just gone.

The user interaction in the transaction flow is also hideous.If you disagree, take a look at the example transaction flow that they display on their site.

Here's how it looks like it works:

  • Take out your phone,
  • Enter your phone's password
  • Launch the payment app
  • Enter the app's PIN
  • Take a picture of the QR code that the register displays
  • Hope you have cellular signal
  • Get a QR code back
  • Let the clerk scan the reply code
  • Put you phone away
  • Receive your merchandise

Compare that to NFC

  • Take out your phone,
  • Tap the NFC pad with your phone
  • Enter the app's PIN
  • Put you phone away
  • Receive your merchandise

I'm sorry but that dog won't hunt.

Comment Re:Not a chance (Score 1) 631

I don't want to give you nightmares, but it is horrifying how little security there is on ACH transactions. The whole system relies on the ability to undo transactions to discourage fraud. All anyone needs is the routing and account numbers that are helpfully printed on your checks.

I hate to break it to you, but your average individual cannot initiate an ACH transaction and transfer money out of your account.

Comment Re:Still have to install (Score 1) 113

Still, though, this vulnerability appears to be firmly in the area of social engineering because why would I want to download an encrypted image file that requires another separate, random app to decrypt and view it?

The payload is encrypted/embedded into an image that is an asset inside the application such as a splash screen or a logo. It appears innocuous until the application runs, extracts the embedded apk and executes it. Prior to that the malicious payload is not detected by application scanners that scan the carrier apk.

Comment Re: Golden Hammer (Score 1) 195

1. Basically, all crypto that uses "magic constants" without a clear and complete spec of how they were reached is highly suspect. That includes most ECC crypto the NSA has done so far and is likely the reason the NSA and some vendors like RSA are pushing for the use of ECC crypto.

Very true in general. With elliptic curves, you need to use specific curves because randomly selected curves are easily compromised. Only curves with very specific properties are acceptable, but as you point out the NSA has not publicly enumerated those properties. The very same thing happened with the selection of the S boxes in DES, but in that case it turned out that the NSA recommendations did, in fact, harden the algorithm from attacks such as differential cryptanalysis, an analytical technique not publicly known a decade later. Unfortunately the recommended elliptic curves have turned out a bit differently so far and thst shift seems to echo the changing mindset of the NSA and/or the administration that it reports to.

Comment Re:Not at all accurate (Score 1) 39

Can TOR be used with this program to make it even harder to track?

Unfortunately not. TOR only obscures your source IP address from servers and peers that you are connecting to. It won't help for an application that is residing on your phone. You could use any number of the location spoofing frameworks that are used for testing applications to provide fake/random location data.

Comment an opinion from the self entitled generation (Score 5, Insightful) 429

Over the last year, I've been plagued by rogue BitTorrent users who've crept onto these public hostpots either with a stolen/cracked password, or who lie right to my face (and the Wi-Fi owners) about it.

Huh? They lie right to your face about it? Wait a minute. Who the hell are you anyway and what do you have to say about it? If it bothers you, buy yourself a mobile hotspot and STFU. At least maybe they are actually buying food/coffee/whatever and aren't just using the cafe as their personal office. What's the next complaint? That their conversations are too loud and you can't hear your conference calls?

Slashdot Top Deals

For God's sake, stop researching for a while and begin to think!

Working...