Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

Comment Re:Illegal search applies here (Score 1) 202

Excellent post, just a couple of comments.

A previous administration attempted to force asylum seekers to wait their turn for a hearing outside the country.

Which is really, really stupid. It just makes them some other country's problem, and no other country should be willing to put up with it.

First, it's interesting that Nikkos said "a previous administration", without naming it. It was, of course, Trump 1.0.

Second, international treaties on refugees don't require a country to accept every refugee and there are multiple examples where nations have made agreements that modify which county must handle asylum claims. For example, the US-Canada Safe Third Country agreement specifies that asylum seekers must make their asylum claim in whichever country they arrive in first. If the US and Mexico had a similar agreement, then refugees could not enter from Mexico at all. Trump tried to get Mexico to sign a Safe Third Country agreement, but Mexico refused -- and it probably would have been invalid anyway, since Mexico might not satisfy the requirements of a "safe" country under the US law that authorizes the signing of Safe Third Country agreements.

Instead, Trump signed the "Migrant Protection Protocols" agreement with Mexico, which was the "remain in place" agreement. You said that no other country should be willing to put up with it, but Mexico did formally agree to it, though only to avoid tariffs. Of course, Mexico has declined to renew the protocols in Trump 2.0 (though Trump announced they had, which Mexican President Claudia Sheinbaum immediately denied -- Trump's habit of unilaterally announcing that an agreement has been reached obviously doesn't really work).

Anyway, there are lots of reasons why countries might agree to various limitations on asylum processes to manage refugee volumes, and these agreements are often perfectly valid under international and national law. Trump, of course, doesn't care about legality, or humanity, only what he can get away with.

Comment Re:I never stop being amazed (Score 4, Informative) 48

"Matter-over-Thread" is actually a solid strategy compared to most 'cloud connected' wifi smart devices.

This is more akin to Zigbee/Z-Wave. It's a local, non-internet scheme for local communication and control. You can get a totally local air-gapped Matter over Thread setup running without internet. It's if you pick a cloud-connected thread border router when you get in trouble, but you can roll your own, e.g. with Home Assistant platform providing a way forward.

Comment Re:What do they care? (Score 1) 44

Some possibilities:
-The agent buys the wrong thing and Amazon sees a substantially higher rate of returns or other bad customer feedback
-The agent buys one thing despite Amazon search results trying to push a different option
-Amazon's upsell for "you may also like" is tanked by the agentic purchaasing.

Comment Re:A lot of money (Score 2) 10

Don't worry, they are probably getting paid 300b by Oracle, 250b by microsoft, and 38b from Amazon so it all will work out nicely.

A lot of the deals lately seem to be company A and B pay each other X amount of money and pretend that is big revenue despite relatively little net money exchanging hands.

Comment Re:Who wants this? (Score 1) 54

You could, in theory, have a context that is entirely within the sandbox and useful. Hence my comment about getting things in and out of the environment potentially negating many of the scenarios I can think of. But broadly speaking, if you had some local processing to do, you feed the environment a blob and the environment can now pretend it's a normal file as far as it is concerned, and then you can pull the blob out when done. WASM can't touch real stuff but you can feed it stuff within the reach of javascript which itself is still sandboxed, but specific network touch points and user indicated file touch points can be put in the reach of javascript.

So if you wanted to apply, in browser, some linux utility to a file, then the user has to indicate a file for operating on via browser, and that action allows javascript code to access that file, and with that granted it can load it into some memory that you've allocated for this purpose, and when done move the data back or wherever.

But the much needed sandbox does greatly complicate things and for some sorts of files the resource usage would be prohibitive in this scenario.

Comment Re:Who wants this? (Score 1) 54

So I have had a few scenarios where I really didn't have any business moving data between the browser and a backend service and I would have just as soon done an operation client-side, but the ecosystem that was equipped to do the task wasn't exactly trivial to get to work in-browser. I could imagine some such use cases easier to port if a Linux instance could live transiently in browser runtime.

I've spent a fair amount if time trying to wrangle specific use cases into this scenario, but could imagine a 'lazier' way if a linux layer already abstracted away the browser runtime weirdness that many libraries aren't equipped to deal with naturally.

I think broadly speaking people that induce these requirements on my team are thinking the wrong things, and there's generally a smarter way to do it, but it does mean I get exposed to some weird use cases where a more traditional software interface is abstracting the browser-specific environment. Though I wager moving data in and out of the wasm may disrupt all the potential benefit...

Comment Re:F-Droid's claim isn't quite accurate (Score 1) 49

Errr no, their claim is completely accurate. ADB is just not a viable way to do anything for 99.9% of people. It's a complex developer tool that the vast majority of mobile users are simply not capable of using. There's no such thing as single click install, as you even have pointed out with the hoops you have to go through. That is enough to turn many people off, before considering that not every developers wants to go through the hassle of packaging their apps in this way.

That's also before you consider ADB can't actually install an app that updates itself, congrats, you've now just pissed off a whole world of power users too who don't want to deal with it either.

I once had an interesting conversation with an Android OEM. I sat down with them to discuss what security issues they'd like to see the Android security team work on. They asked me "When are you going to fix the USB hole?". I didn't know what they meant and asked for clarification. They explained that in some parts of the world, notably India and China, there were "free" charging stations set up in bus stops, train stations and other public areas. These charging stations allow the public to charge their phones, for free! There's just one catch. On a sign above the charging station there's a set of instructions that tells users how to go about activating the charging. The sign tells them to go into the Settings app, then "About Phone", then scroll down to the build number, tap it seven times, then... it walks them through enabling ADB and accepting the key of the "charging station" computer, which would then proceed to install malware -- and to start charging.

Huge numbers of people used these charging stations every day, to the point that the biggest problem users had (besides the malware) was that they were always occupied. No one had a problem with "activating" charging for their device.

90% of people are capable of following a list of instructions. 100% of people are capable of either following a list of instructions or getting someone nearby to do it for them.

Anyway, this OEM wanted us to disable ADB entirely, or allow them to, because their users were doing it, getting loaded up with malware, and then blaming the OEM for making a crappy phone. I, of course, told them that we were not going to disable ADB and we were not going to remove the compliance requirement that forces them to support ADB.

Unfortunately, the current change still doesn't fix the "USB hole", but it does offer a way to rate-limit malware installation via downloadables.

Anyway, if you really think your users can't follow instructions, or can't get someone else to do it for them, you can always just register for a developer account. As long as you don't distribute malware, people will be able to sideload your APKs without using ADB. If the $25 is too much for you, maybe share the cost with some buddies, or get one of the limited accounts, though your APKs will only be installable on a small number of devices. Except, of course, by people who can follow instructions, or get someone else to.

Comment Re:F-Droid's claim isn't quite accurate (Score 1) 49

This is about control, 100%.

Oh, actually, I missed the most obvious flaw in this argument: The verification doesn't give Google any significant control! It does give them the real-world identities of registered developers, yes, but then what? It doesn't do anything to require registered developer to use the Play store or comply with any Play policies other than one: Don't distribute malware.

The real purpose here is malware rate-limiting. Right now, malware authors can pump out huge numbers of apps with small variations to defeat identification. Google may identify one malicious app and warn all of the user that have it installed, but the malware author has thrown out a hundred variations of that app and Google only twigged to one. What ID verification does is require the developer to tie each app to a unique government-issued ID. In countries where you can't just go get a hundred government IDs, this means teams of malware authors can make approximately one malicious APK per team member. In countries where they can go get a hundred unique government IDs per person (because the government is actively cooperating or because they have a cousin in the ID office) it doesn't help so much, but Google can then start working with the governments to crack down.

I don't know if you noticed in the announcement, but this program is starting in a small number of countries, with the cooperation of and at the request of the governments who are trying to defend their populace against waves of malware. This isn't an accident.

Comment Re:F-Droid's claim isn't quite accurate (Score 1) 49

How many cases of Malware in F-Droid do you know and how many in the Play Store?

How many apps in F-Droid vs how many in the Play store?

Actually, though, your comment and my off-the-cuff response both miss the real difference which is why malware authors would choose to use F-Droid to distribute their apps. They'd have to publish source, which would be a disadvantage in the competitive world of malware authoring, and publishing source code would also make it easy for their malicious code to be identified. It makes a lot more sense for them to publish via downloadable sideloads or -- even better, if they can manage it -- in the Play store.

From a security perspective, it makes sense to treat F-Droid differently from random downloadable sideloads... but how is the Android OS supposed to tell the difference? The Android mechanism for establishing APK trust is signatures. So... F-Droid could arrange with Google to get the platform to trust APKs signed by F-Droid, which would make F-Droid work fine. And, actually, there's no need for Google to go through any complicated process to set that up: F-Droid can simply register as a developer and sign the APKs it distributes. Done. Of course, if F-Droid ever screws up and does distribute malware, it could result in all of their apps being evicted from Android device, but since F-Droid is a zero-malware platform, that's not a problem, right?

Slashdot Top Deals

We all agree on the necessity of compromise. We just can't agree on when it's necessary to compromise. -- Larry Wall

Working...