Forgot your password?

Comment: Re:landline? (Score 1) 497

Bug in their autodialer code and his number sorts early in their loop?

Either way, while CLID is worthless garbage, the call setup IS recorded and tracked, and if you're getting harassing calls from a spoofed number you can call your phone company to get them to trace the real number.

The other possibility is that they're not buying or spoofing, but that they're hacking VoIP systems. All the VoIP systems I run see continual attempts at password guessing (until fail2ban says 'fuck you' to the IP, untill it hops to another host... the forever war).

Comment: Nobody mentioned the exploit? (Score 4, Interesting) 583

by Harik (#44473179) Attached to: Half of Tor Sites Compromised, Including TORMail

There's a pretty good unwrapping of the payload here, and it's a pretty creative exploit of the javascript interpreter to execute shellcode. Just from a glance at the shellcode, I see a hand-crafted HTTP header so at minimum they're using the OS network stack directly to give the tor-level UUID a public IP coorelation. Beyond that, they could be doing anything since they're already through the sandbox.

Comment: Re:Misses the point (Score 1) 419

by Harik (#44086891) Attached to: Android Fragmentation Isn't Hurting Its Adoption

I disagree with your first statement - it's different to argue ease of compatibility between versions vs the benefits of sticking with ancient releases. I don't think anyone is happy about the continued market share of android 2.3, but from a developer perspective it's not world-ending to use some support libraries instead of natives for it. (It bloats the hell out of your base app size, though).

The unfortunate reality is that phone manufacturers see software updates as a 'feature' to sell newer phones - I don't think this will change barring a radical relicencing of android from Google. One thing that may give them impetus to move along would be forcing unlocked bootloaders - if they don't supply the upgrade, third parties will, and then all their tie-in bloatware goes away.

Comment: Re:Misses the point (Score 1) 419

by Harik (#44086815) Attached to: Android Fragmentation Isn't Hurting Its Adoption

Except most of the new features you get on a new google release come with back-support libraries (Google or third party) that let you target older platforms. Writing an app for 2.3+ with modern features using HoloEverywhere was nearly as trivial as changing imports from to org.holoeverywhere.

If you're doing CPU intensive work, you're going to target 4.0+ anyway, simply because no device that runs 2.3 stock has a modern processor in it.

Comment: Re:So... (Score 1) 467

by Harik (#44056247) Attached to: Altering Text In eBooks To Track Pirates

They could rewrite the entire book, keeping only some of the sections with deliberate watermark errors, and it'd still be tracked down to them.

You miss out on the fact that they're not looking for errors - they're looking for specific errors in specific places. Think back to old detective novels with a piece of cardboard with little squares cut in it. Put it over the right page of what looks like a love letter and "we bust out of the back exercize yard at midnight" pops out.

With sufficient redundancy in their data (Come on, people, QR codes, PAR2? ECC? How does a group of computer people not instantly comprehend the idea of redundancy?) you couldn't be sure that random selection of bit flips would be enough to obscure your trail.

Comment: Re:So... (Score 1) 467

by Harik (#44056165) Attached to: Altering Text In eBooks To Track Pirates

And finally, _if_ the publisher finds a copy with watermark removed, then I would think the copier has gone straight into criminal territory, so while the risk of getting caught is lower, the possible damage to you is much higher.

Right, it's finding the watermark removed that's the big red flag, not that they found it on a filesharing service. Do people think about what they type before prognosticating on /.?

Comment: Re:The Manchurian Candidate (Score 1) 240

by Harik (#43947827) Attached to: Clearing Up Wayland FUD, Misconceptions

You're frankly too stupid to even cater to. Wayland (nor Xorg) get to dictate how the apps you want to use are written. Since basically everything now is doing the rendering themselves and pushing bitmaps, X11 is terrible at remoting. If you have control over your app then make it remote properly yourself.

Otherwise shut up and stop trying to tell the rest of us that running a text editor from 1992 is the be-all-end-all of remote graphical work.

Comment: Re:The Manchurian Candidate (Score 2) 240

by Harik (#43947791) Attached to: Clearing Up Wayland FUD, Misconceptions

Outside of those types and pathological configurations, remote X11 just works for all apps.

So running an app over the internet is a pathological configuration?

X11 is utterly garbage at remoting because it was never designed for it, it was designed for LAN use with near-zero latency. That's why the calls are syncronous.

Sure, it's possible to forward an X11 connection across 100+ ms of latency, but I wouldn't call the resulting clusterfuck 'usable'. There's a reason that the nX library is used to make it reasonable - and there's no reason that you can't do the same with a different library that's not inherently constrained by a 26 year old design with no concept of high-bandwidth/high-latency connections.

Per-window RDP is utterly trivial to implement and works better on modern connections than X11 ever has.

Nothing will ever be attempted if all possible objections must be first overcome. -- Dr. Johnson