Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment: Damn, saw that coming. (Score 1) 55

That's too bad, but I expected it - they announced it, asked for partners, and then it was crickets until they started on the Ubuntu for Phones path.

It's a damn shame, though, I bet it would ROCK on my Note 3, it's so crazily powered - 2.3 gHz quad-core CPU, 3 GB of RAM and 96 GB of storage. I would freaking LOVE to see Ubuntu run natively on this thing to a screen or a lapdock. Same for the new CyanogenMod phone, except it doesn't have MicroSD storage as an option.

Comment: Re:It's a pity (Score 1) 161

by Abalamahalamatandra (#46639691) Attached to: Canonical Shutting Down Ubuntu One File Services

Consider SpiderOak Backup - they have a package repository for Ubuntu and the "Spideroak Hive" is, I believe, much like the Ubuntu One folder. I use it for backups but it looks to be nicely usable as a One replacement, especially if you're not sharing with other people a lot.

They recently sent me an email that they're offering unlimited storage for $125 a year as well, though I'm not sure how that works in practice.

And, of course, their big claim to fame is that they're zero-knowledge, so no NSA requests, etc etc.

Comment: Re:WTF is OneNote? (Score 1) 208

by Abalamahalamatandra (#46523915) Attached to: Microsoft Releases Free Edition of OneNote

I hate Microsoft with a flaming hot passion, but I'll say this: OneNote is a very cool and under-appreciated program.

One very cool feature I used to use a lot when I was consulting - I often had analysis engagements where I had to spend one or two marathon days interviewing lots of different staff members. OneNote has a feature that allowed me to record audio of the interviews (and only about 10 MB per hour) and would store pointers into the audio as I typed notes into OneNote. Then later, if I had a question about something, a quick double-click of the text in the notes would automatically start the audio playing a configurable number of seconds before I started typing.

It could even do the same thing with video and audio - I brought in my QuickCam Orbit with face tracking one time, and the camera would follow the speaker's face. Just a tad too disconcerting for the interviewee though, I didn't do that very much.

Sadly, this free version doesn't do the above - you still have to buy the full version for that. And somebody told me the free version is licensed such that companies can't use it anyway, so I won't be using this - I run Linux at home.

Comment: Re:I got the notice... (Score 2) 137

by Abalamahalamatandra (#45986747) Attached to: Target Credit Card Data Was Sent To a Server In Russia

I read an article on this recently, it appears that Target contacted both those whose name/address/email had been compromised AND those who use their credit card there during the time period using the same email. They should have split the two.

So it's likely that your personal information was compromised, but not your credit card number. Be on the lookout for phishing attempts.

Comment: Limiting outbound access to servers is too tough (Score 2) 137

by Abalamahalamatandra (#45986701) Attached to: Target Credit Card Data Was Sent To a Server In Russia

So, time for me to rant, but on-topic, for a second.

Everybody knows, I would hope, that best practice is to never allow an Internet-facing server to initiate outbound traffic. This is both because, should the server get compromised, it becomes a new attack vector - as in Code Red or SQL Slammer. This is also because, as in Target's case, it makes it fairly trivial to exfiltrate stolen data.

But services still persist that require that this very access be enabled. My current case in point: ReCAPTCHA. Google hosts the URL for this service, intended to provide additional security, on a www.google.com URL, which means that, at minimum, I have to allow outbound access from any server hosting a ReCAPTCHA on port 443 to everything Google owns. In practice, of course, it's all but impossible to keep track of Google's address space for firewall purposes, so this means that I have to allow that server out on port 443 to the entire Internet. It's either that, or set up a proxy solution that can do URL filtering and then require the CAPTCHA verification code to use that. Not exactly something your typical smaller company using ReCAPTCHA is apt to do.

I've talked to competing, for-pay, services, and they require the same thing, despite the fact that they're smaller and have only a few, well-defined networks, but they won't commit to keeping me up-to-date with network changes.

We really need to start pushing back on this crap. Servers accepting inbound traffic should never need to initiate outbound communications.

Comment: Re:Quintessential classic military sci-fi book? (Score 1) 732

by Abalamahalamatandra (#45349389) Attached to: Movie Review: <em>Ender's Game</em>
My thoughts exactly. Maybe Ender's Game is considered to be so by people under a certain age, but Starship Troopers is almost certainly THE quintessential classic military sci-fi book.

And I would also argue that The Forever War should be in the list somewhere above Card's book.

Heck, between the RPV's and the children, I'm almost hesitant to even call it a "military" book per se.

Comment: Re:Self signed? (Score 2) 276

If the data is that confidential, you should probably look into an actual FIPS-certified network-connected HSM instead of rolling your own.

I did a project a few years back using nCipher NetHSMs (they've since been bought up, I believe) and they were quite cool technology. Even then, I think one of these devices was in the $25K range at most.

The great thing is, if you generate a key pair with one of these, you literally cannot get access to the private key to hand over to the government, even if you wanted to.

Comment: Re:Self signed? (Score 4, Informative) 276

Actual answer: no.

The CSR (Certificate Signing Request) contains only the public half of the key, to be signed by the CA's key which results in the CA attesting that the information is verified.

The entity whose key was signed always maintains control of the private key. Which, to me, is the reason that public-key encryption is not "over". The NSA would have to strong-arm every single holder of an SSL key, not just the Certificate Authorities.

Granted, though, those private keys are not often held terribly securely - they're most often just files on a server that aren't even password-protected, because that requires an admin to type in passwords whenever the Web server is restarted. They COULD be held in an HSM, a hardware security module much like a TPM on steroids, but that's very expensive and difficult to set up.

However, none of this means that public-key crypto is broken. It's possible that individual sites could be compromised via this route (Facebook, Google, etc) but as a whole, no.

Comment: Re:There is already encryption in HAM band (D-star (Score 1) 371

by Abalamahalamatandra (#44117745) Attached to: FCC Considering Proposal For Encrypted Ham Radio

The hardware isn't from Icom, it's from DVSI and available, at least on paper, to anybody that wants to pony up for a pre-programmed DSP from them. The existence of the DV Dongle from Internet Labs completely disproves your statement.

Now, as I've previously posted, I don't like that it's a proprietary codec that is only implemented in hardware, but that doesn't mean "you need to buy decryption keys [...] from Icom". Let's keep this conversation factual, shall we?

Comment: Re:packet radio? (Score 1) 371

by Abalamahalamatandra (#44117557) Attached to: FCC Considering Proposal For Encrypted Ham Radio

Sadly, the protocol didn't allow for identifying the codec used for the voice bits, so even if one wasn't concerned about interoperability with normal DSTAR radios, it's not possible as the DSTAR radios will try (and fail) to decode the voice data that's encoded using Codec2, but try to decode it in AMBE.

I think we need a newer protocol anyway that is much more supportive of mixed voice and data comms - the only way to send data with a DSTAR handheld is by keying up voice, wasting most of the bits, and sending slow-speed data along with the voice bits. It's really tragic if you ask me, such a waste.

Those who can, do; those who can't, write. Those who can't write work for the Bell Labs Record.

Working...