After 5 years you can still read it and understand what it was supposed to accomplish, and it does so.
Slashdot videos: Now with more Slashdot!
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
Don't waste time learning this framework. In a month there's a newer and even better framework which will only be supported for a few months before everybody bails to yet another framework.
I guess Google needs to put this project back in the fridge and think about it a bit more.
To be precise, for the 'old' version of the app (My BMW Remote App) for non-i models we started off with this black box library (CD lib) which handled all the communication with the BMW servers.
While I didn't do any protocol analysis or looked at the communication between car and servers, even for this iOS app it was pretty clear to me and my colleagues what the security implications would be if someone were to be able to obtain log-in data just for that part of the communication.
Depending on the market (America, Europe, Japan, etc.) there are some limitations to what one can do with the app (based on the type of account, IIRC), such as from what range one can see where the car is on a map and whether one can unlock doors with the app or not (not allowed in the US market, from what I recall). Where these limitations are enforced I'm not sure. It might be based on the server, in which case this hack would bypass such limitations as well.
At any rate, this security leak does demonstrate quite succinctly how important it is to properly security audit such systems before releasing it into the wild. Even for the current project I do for BMW (related to the headunits), having an active internet connection means that security is essential, including plugging buffer overruns and similar.
Nobody wants to have one's headunit go blank during navigation, in a constant reset cycle or be turned into a spying device, after all
Note that I'm still under NDA for all of these projects, so I can't go into much detail.
Additional update (from the article):
Meanwhile, since our story was posted, donations flooded Werner's website donation page and he reached his funding goal of $137,000. In addition, Facebook and the online payment processor Stripe each pledged to donate $50,000 a year to Koch’s project
Microsoft actually sells stuff that you can buy and use without agreeing to allow your data to be mined.
For now. For example, Microsoft no longer sells a non-service version of MS Office.
It's still less memory hungry than Chrome.
Either way, @LizardMafia's Tor relay attack isn't new. There's a paper on how Tor loses anonymity if over 50% of relays are compromised.
I was going to go with botnet, but many LizardNSA relay IPs appear to route back to Google Cloud. Thousands of tiny VMs at low bandwidth?
You can see this whole list of tor nodes here: https://torstatus.blutmagie.de...
All Lizard nodes resolve to *.bc.googleusercontent.com
If you get too much foam, maybe you should clean tour glass and improve your skills in pouring a beer.
On September 29, 2014, MPEG LA announced their HEVC license which covers the essential patents from 23 companies. The license is US$0.20 per HEVC product after the first 100,000 units each year with an annual cap.
 http://www.mpegla.com/main/pro... (PDF)
iTunes does not work on my 10 month old Panasonic "Smart" TV, or Linux based HTPC, or Sony PS3. Amazon only recently started selling ebooks here, nothing else. Netflix is great though, now if they can finally convince content providers to license them more content.
So what are these alternatives?
With the many assumptions made about what constitutes 'true' intelligence, how sure are we of the assumption that a human being of at least average intelligence would pass it? What's the research telling us there so far?
Or are human and artificial intelligence somehow considered to be mutually exclusive?