Forgot your password?

Comment: Re:How do deal with copycats? (Score 1) 112

by GTRacer (#47755421) Attached to: Is Dong Nguyen Trolling Gamers With "Swing Copters"?
Depends on your tolerance for installing and presumably uninstalling the clones as you work your way through their energy cycles. I personally loathe installing apps without first trying to figure out what they'll really be doing and why I need it. And I run XPrivacy so it's not like apps have free reign on my phone. I just don't like them leaving their junk everywhere or pitching ads to me.

Comment: Re:What was and wasn't working... (Score 1) 97

by GTRacer (#47746573) Attached to: Hackers Claim PlayStation Network Take-Down
As a U.S.-based player, I had no luck connecting to Final Fantasy XIV starting round 11am, giving up at 10:30pm. Not continuous login attempts of course - we had stuff to do during the day. But a good 3 hours of click - fail - click - fail - reboot - click - fail.

I played a little P.T., Last of Us and Pinball Arcade to pass the time but never could get into the PSN Store or to XIV's login screen.

Comment: Re:Why dignify it as "social engineering"? (Score 1) 45

I must be one of the few people who actually likes the term "social engineering." I first encountered it in connection with Kevin Mitnick and Kevin Poulsen's biographies. While I completely agree at the root level SE is just a synonym for con games, fraud and the like, I accept it as a situationally-applicable variant when it pertains to security bypasses. As distinct from conning someone out of their Medicaid checks or pushing counterfeit merchandise with a smooth pitch.

I also like to think the engineering part comes into play when you design a system for ingratiating yourself into a foreign organization's trust, especially when it leads to credentialed access to I/T systems.

Comment: Re:Alter the phone so standard tools won't work (Score 1) 82

by GTRacer (#47693805) Attached to: EFF's Cell Phone Guide For US Protesters
Umm... You're talking about physically flipping the USB port, right? To essentially physically obfuscate the connection in the hopes they try their cable and give up?

Aside from that old chestnut "Security through obscurity isn't security," when's the last time you plugged in a USB cord right on the first try?

Pretty much every device I have where the cord isn't already bent into position gets the push / fail / flip / push / fail / flip / crap it was right the first time treatment.

Comment: Re:Shouldn't be necessary, but if it is... (Score 1) 120

by GTRacer (#47649413) Attached to: Hackers Demand Automakers Get Serious About Security
I, however, will buy them:

Remote Start: My car has a rotary motor. One lovely aspect of its design is that it really should be gotten to operating temperature before driving under any sort of load. And in the winter, I'd love to be able to warm the engine and the interior from inside my house while I gather my things for work.

Crash reporting: Agreed on sensor redundancy but at the same time, part of the reporting includes detection of airbag deployment, ABS / traction control usage prior, speed prior, and more. This data is used to help triage the severity of the crash before the EMTs roll out. Can all this be made redundant and air-gapped whilst remaining useful?

Theft recovery: I've not heard of any remote-drive systems, only telematics to locate and shut down. The telematics is used to determine approximately when and where the car is moving, or when it was last driven and where to. Makes it easier to track down quickly before it's parted out. Also, in extreme cases, the OnStar / Bluelink / et al. system can actively end a felon's joyride by cutting throttle, braking, or cutting the engine entirely. Then it can honk and flash the lights to attract the authorities' attention.

+ - Hilton Plans Phone-based Check-in and Room Access

Submitted by GTRacer
GTRacer (234395) writes "Forbes reports that Hilton Worldwide, international hotel operator, is rolling out smartphone-based guest tools allowing self-service check-in, access to a virtual floorplan to select a room, and (in 2015) actual door access once checked in. The author states the drive for this technology is the growing influence of the swelling ranks of Millennials, who "[...] have a very strong inclination toward automated and self-service customer service." The security risks seem obvious though "Four Seasons Hotels and Resorts [is] working on using the same, or a similar, system soon–and Four Seasons is nothing if not secure and discreet.""

Comment: Re:Anti-piracy (Score 1) 234

by GTRacer (#47560175) Attached to: Free Copy of the Sims 2 Contains SecuROM
Given Zaphod's massive ego, bolstered by the Total Perspective Vortex proclaiming him the center of the Universe, I'd say the zed's are for his three arms?

I mean, what are the odds two earthlings and two Betelgeusians would meet not once but twice in an interstellar backwater only to go off on an adventure spanning time and space? At least as big as Zaphod's ego anyway...

The only way to learn a new programming language is by writing programs in it. - Brian Kernighan