Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Re:Check their work or check the summary? (Score 1) 472

by LordLimecat (#49343591) Attached to: No, It's Not Always Quicker To Do Things In Memory

String += String

Im in a 200 level java class. We're just learning inheritance. I could have told you why thats a bad way to do things.

Do people not study what arrays are and why its expensive to continually append to them anymore?

Maybe these folks need to go back to basics.

Comment: Re:goddamnit!!! (Score 1) 122

by LordLimecat (#49343565) Attached to: Hack Air-Gapped Computers Using Heat

And you've provided no evidence or analysis why you're supposed mitigations are an insurmountable defense; at best they're only a stop-gap.

In THEORY breaking most encryption is just guessing the right 2048-bit code. At best, increasing the length from 1024 to 2048 is just a stopgap.

In reality, some attacks are so esoteric and hard to pull off (famous example: hard drive magnetic domain remnant detection) that they are not a real-world threat. MAYBE they could adapt this, but it already requires
A) a machine connected to the internet that is compromised (!)
B) an AIR-GAPPED, high-security machine directly adjacent to it (!!!)
C) That that air-gapped machine be compromised as well (!!!!!)
D) Sensors in both machines sensitive enough to detect incredibly minor fluctuations in temperature (given that a steady stream of air will be flowing through)

The proper security procedure is to analyze the chance of the risk, the annualized loss expectancy, etc, and then come up with mitigations. Ok, let me give this a shot.
2) probably dont stick it directly adjacent to non-airgapped machines

Comment: Re:goddamnit!!! (Score 3, Insightful) 122

by LordLimecat (#49327483) Attached to: Hack Air-Gapped Computers Using Heat

So I fail to care about which term is used, it is a security breach and one of the worst kind

Except it will only work in the most esoteric scenarios with laboratory conditions, sure. 2 PCs, with side-vent cooling and no cold aisle, and a distance of 15 inches?

Somehow I dont think this will threaten air-gapped secure networks. Those are going to have steady cold air coming in the front, and exhausting out the back; if theyre dumping significant heat through the side of the cases you're doing it wrong.

The meat is rotten, but the booze is holding out. Computer translation of "The spirit is willing, but the flesh is weak."