Please create an account to participate in the Slashdot moderation system


Forgot your password?

Comment Re:Will Use Neither (Score 3, Insightful) 93

Having a company that collects passwords

The quoted part never sat right with me, I've always felt somewhat icky about the idea of giving out all of my passwords to a company-controlled service. I don't know if it is rational to be wary of them or not, I certainly haven't heard of them doing anything nefarious or anything to earn it, but passwords and usernames are just so damn important that I just don't know if I'd want to hand the whole damn treasure-trove out to an unknown 3rd-party. I've always used Keepass 2.x to store my passwords -- the password-database is always in my control, and there are good, open-source apps for Keepass-databases for Windows, Linux, Android

Comment Re:this is why (Score 2) 70

However, for a machine I'm giving to a friend or family member, what I wind up doing is just a format command, then a pass with cipher /w (assuming Windows.) Since all my volumes are BitLocker protected, a format command overwrites the areas on the hard drive with the volume master key multiple times. Even with the right BitLocker password or recovery key protector, the data is gone, since the master key cannot be retrieved. The cipher /w just does a simple three pass (zeroes, ones, random numbers), which is good enough for almost anything.

Why? What's the point? Self-entitled "nerds" here keep perpetuating the same old myths that you need to wipe and wipe and wipe and wipe a billion times for the data to be completely inaccessible and are just making themselves look just as ignorant as the people they berate themselves.There is plenty of research on this topic and I wish people would just finally learn something and stop spreading some god damn myths.

The purpose of this paper was a categorical settlement to the controversy surrounding the misconceptions involving the belief that data can be recovered following a wipe procedure. This study has demonstrated that correctly wiped data cannot reasonably retrieved even if it of a small size or found only over small parts of the hard drive. Not even with the use of a MFM or other known methods. The belief that a tool can be developed to retrieve gigabytes or terabytes of data of information from a wiped drive is in error.

        Although there is a good chance of recovery for any individual bit from a drive, the chance of recovery of any amount of data from a drive using an electron microscope are negligible. Even speculating on the possible recovery of an old drive, there is no likelihood that any data would be recoverable from the drive. The forensic recovery of data using electron microscopy is infeasible. This was true both on old drives and has become more difficult over tine. Further, there is a need for the data to have been written and then wiped on a raw unused drive for there to be any hopy of any level of recovery even at the bit level, which does not reflect real situations. It is unlikely that a recovered drive will have not been used for a period of time and the interaction of defragmentation, file copies and general use that overwrites data areas negates any chance of data recovery. The fallacy that data can be forensically recovered using an electron microscope or related means needs to be put to rest. --

Studies have shown that most of today’s media can be effectively cleared by one overwrite.

        Purging information is a media sanitization process that protects the confidentiality of information against a laboratory attack. For some media, clearing media would not suffice for purging. However, for ATA disk drives manufactured after 2001 (over 15 GB) the terms clearing and purging have converged. --

For the purposes of clarity, this will be repeated: If every single sector of a modern hard drive is overwritten, then NO DATA can be recovered, and especially not by the police. In fact companies such as Ontrack, who spend millions of dollars on research into data recovery are not able to do this. This wiping does not need to be done 33, 12, or even 3 times. Just once. -- https://whereismydata.wordpres...

These things go on forever if one just bothers to Google a bit, I could keep linking and quoting stuff for several books' worth.

Comment Re:Are they actually powered down? (Score 3, Insightful) 58

Agreed, unwanted shutdowns seem to be a thing with mobile devices in general.

I wouldn't quite agree. Most often I see it happening when people are using custom ROMs on Android and the kernel-dev screwed up with timings or undervolts the device a bit too much when it goes idle and it basically crashes when it goes to sleep. There are the occasional SoCs that got through the testing at the factory, but when in actual use they still end up crashing during sleep due to lower clocks than usual, but usually raising the clocks slightly fixes that. I would assume all it takes for Apple to fix this is a quick kernel-patch.

It's anecdotal evidence, sure, so take what you will from it, but I certainly haven't experienced sleep-of-death on any of my devices nor have I heard of anyone in my circles having such and therefore I find it hard to believe it was some sort of common issue.

Comment Re:Consoles are easy to choose, use, and afford (Score 2) 250

One console, one TV, two extra controllers, and one copy of four $60 games is cheaper than three gaming PCs, three monitors, and three copies of four $40 games.

I don't contest the other points, but why do you think it's okay for the kids to share one console, but then every kid must have their own PC? Why couldn't they just as well share the PC?

Comment Re:Solution! (Score 1) 205

That's how the whole upgrade - process works: the upgrade is tied to your specific hardware and as such your computer's details are sent to Microsoft at the time you perform the upgrade. Then, if you ever wipe the machine and re-install Windows it'll just check whether you machine matches a record they've already got and if it does it'll automatically be activated. This is only for the upgrade - version, the regular Windows 10 does require using a key. The keys the upgrade - version uses are generic ones, everyone's got the same keys and you can't use them to install a regular Windows 10 on some other machine.

Comment Re:Solution! (Score 4, Informative) 205

You don't need the activation key at all. Just upgrade to W10, make sure you are activated, then wipe and install W10 without any key at all -- once you're online Windows will automatically activate your system. There is no need for the key at any point nor for using a Microsoft - account, it works just fine even with a local account.

Comment Outsourcing to India? (Score 2) 114

I wonder how this'll affect the companies that outsource stuff over to India and how badly this screw over their customers. I mean, I would imagine many of these outsourced services will need access to customer records and stuff from the company that hired them, but if the government insists on downgrading encryption and stuff it'll make it much easier for attackers to gain unauthorized access or for them to eavesdrop on stuff.

Never say you know a man until you have divided an inheritance with him.