Follow Slashdot stories on Twitter


Forgot your password?

Comment: Re:And still we don't learn (Score 1) 45

by Martin Blank (#49566867) Attached to: New Zero Day Disclosed In WordPress Core Engine

People go to the shiny sites. If they see older-looking sites, they're less likely to stick around, particularly if it doesn't have the nice features that the newer sites have.

For all the problems that PHP has, I don't see many nearly as many sites going up built on other platforms, in large part because they're playing catch-up and are still largely years behind. .NET is probably the closest, but when you look at the number of free or even inexpensive sites running Windows, it pales in comparison to the PHP-based sites.

Add to this that WordPress is by far the easiest of the major CMS platforms to manage, and it gets even worse. I manage a couple of WordPress sites and a Joomla site. WordPress largely Just Works(TM). Joomla works for basics, but every time I want to get beyond adding a menu item, it becomes a whole new learning process.

Comment: Re:Easy fix (Score 1) 153

by Martin Blank (#49565607) Attached to: The Engineer's Lament -- Prioritizing Car Safety Issues

GM has managed to garner additional positive attention by going back and fixing so many things, as well as by admitting that they should have found (or in some cases did find) the problem and identified a solution. It may have led some other car companies to do something similar, as even without GM, recalls are at record or near-record levels for several companies. Suddenly, recalls seem like the responsible thing to do and appear to help the brand image.

Comment: Re:Reason for not talking to people (Score 1) 72

Articles from last year suggest that the Facebook posting was exactly what led to it. After the defense attorney saw the post by the judge, he motioned for recusal and mistrial. Slaughter was removed from the case, and soon after, the new judge declared a mistrial.

The accused was found not guilty, and looking at the details of the case, it's not hard to see why. The child was (and probably still is) severely disturbed, allegedly killing small animals, making threats against his parents, and hiding knives.

Comment: Re:Easy grammar (Score 1) 626

Worked for me for the most part in Switzerland and Italy.

The only odd exception was a tech store clerk in Zurich who didn't speak English. I speak a smattering of Spanish and my wife conversational French, but he only knew German, Dutch, Italian, and Portuguese. Between seven languages, we couldn't find a common one (and for those that were similar to Spanish, I don't know enough Spanish for the overlap to be meaningful). Eventually, our Swiss friend found us and was able to help us find what we needed.

Comment: Re:What's TSYNC ? (Score 1) 338

by Martin Blank (#49212055) Attached to: Google Chrome Requires TSYNC Support Under Linux

YouTube hasn't been tied to flash for a couple of months, with HTML5 the default video play mechanism since late January. Not all browsers will pick that up, apparently, since I've recently had Flash crash in Firefox during a YouTube playback.

There are plenty of sites still tied to Flash, and that includes internal corporate sites. Those will be even harder to dig out, and Chrome is about the only means of Linux users to access Flash these days (at least in a vaguely secure fashion, since Flash for Linux hasn't been supported by Adobe in some time).

Comment: Re:What's TSYNC ? (Score 1) 338

by Martin Blank (#49212047) Attached to: Google Chrome Requires TSYNC Support Under Linux

The Chrome dev team has been trying to eliminate cruft from the code base for a while now, as is visible if you spend some time in the bug tracker. This may be a case where they got overzealous in trying to not have legacy code remain when they implemented a new feature. But given the number of distros running 3.17 or later, it should have been obvious that backports would be required for many (most?) distros, and that backporting is often seen as more work that distro devs would rather avoid so they can concentrate on standard code-bases.

I see both sides of this: Google wants the most secure environment possible, and Debian has a development freeze for good reason. It's easy to overlook a flag like TSYNC if it's not being mandated by something major when the review is done, which may be the case here. But Debian may have to fold on this because they're not a big enough slice of the user pie to force Google to back down.

Comment: Re:How the fuck does Chrome handle other platforms (Score 1) 338

by Martin Blank (#49211993) Attached to: Google Chrome Requires TSYNC Support Under Linux

Presumably, you're running RHEL/CentOS 6. If so, that's cool if it works for you--the stability is probably greater than just about any other major distro--but I think the expectation is that most who run Linux for their notebooks/workstations will run something newer and more flexible, and run something like that in a VM. But there's always the reality that RHEL/CentOS 6 isn't going to run the latest software in many cases (unless you go with non-standard repos), and here's a case where a browser has become one of those cases.

It's probably also surprising that you run a six-year-old notebook in a corporate environment. Even the fiscally conservative companies tend to upgrade notebooks at least every four years, even if they are Fortune-100 companies.

Comment: Re: GPG is another TrueCrypt? (Score 1) 309

by Martin Blank (#49132959) Attached to: Moxie Marlinspike: GPG Has Run Its Course

No, those who want perfect solutions want the impossible. I want a framework that can be improved over time.

What's the goal? With maybe a handful of exceptions, everyone does something that can compromise their security. HTTPS relies on a trust architecture that we're being reminded recently (Superfish, PrivDog) is actually extremely fragile. And yet it's being encouraged to make the job of the average surveillance tool more difficult. It's very much letting The Other Guy(TM) (remember, three caps minimum on the TM'ed stuff) handle security. It has flaws, but it raises the bar.

That's what we need for end-to-end crypto. It can have flaws, but it needs to raise the bar, and be able to keep raising the bar.

As for understanding how it happens, how many people can describe how an RSA key is generated, much less how a proper PRNG produces a suitably random number and then how AES/Blowfish/whatever encrypts the data? Does the average person need to know that? Not really. And even if they did, they don't care, which is why they don't use it now.

Right now, we have options where you can let a CA provide you your TLS certificate (usually 2048-bit and SHA1). If you know what you're doing, you can roll your own with better security. We need something with that flexibility (though I recognize the flaws of that exact model) for end-to-end crypto, too. We need clients that auto-update, that add or deprecate algorithms as they arrive or are broken without the user having to worry about it, and that can provide safe (and revocable) storage for the keys so they survive a catastrophic loss or be deleted with near-absolute certainty if the user wishes. We need common libraries or protocols that can allow new or existing clients to safely implement connections to these services without having to build them from scratch, thereby preserving and encouraging competition.

These don't lead to a perfect system. They lead to a good enough system with room to grow and improve. But I would argue (as I think Moxie does) that what we have now is far from a perfect system because it's too difficult to use.

Comment: Re:GPG is another TrueCrypt? (Score 4, Interesting) 309

by Martin Blank (#49127783) Attached to: Moxie Marlinspike: GPG Has Run Its Course

Not remotely. He's encouraging good encryption, but calling for some updates (it hasn't significantly changed since the mid-'90s) and a better wrapper. GPG is still largely by geeks, for geeks. I couldn't get my parents to use GPG because they'd dismiss it as too hard, even if one of them is happy to stick it to the man. The suggested minimum settings vary based on where you look and when they were posted.

Example: An RSA key size of 2048 bits is largely considered secure, but NIST recommends 3072 bits for anything that one would want to keep secure into the 2030s. People still often see their e-mail as their private papers and may be concerned over who can read them well past the 2030s. But does that mean they use 3072, or go with the random crypto weblog guy who says to always go with 4096? And why can't I create 8192- or 16384-bit keys like that software claims to over there?

And what to hash to use? Plenty of sites still say MD5, but they were written years ago. Some have updated to SHA1, but others point out weaknesses there. OK, SHA2, then. But then there's SHA256, which must be better, right? (I know SHA256 is a subset of the SHA2 family, but those unfamiliar with crypto will not.)

Until GPG-style crypto becomes relatively automated, it won't be embraced by more than a handful of people. HTTPS is widely used because people don't have to think much about it. This has some downsides for poorly-configured servers and Superfish/Comodo-style backdoors, but browsers and other software help take up the slack by rejecting poor configurations. PGP/GPG were designed to reach near-perfect levels of encryption, but that bar is clearly too high for significant uptake. We should instead be looking for something that encourages end-to-end encryption that is good enough. We can build on if the underlying structure is properly designed, and as people get more accustomed to crypto in their lives, they'll be able to adjust to improvements.

When the majority of communications are relatively well-secured, it makes it far more difficult for a surveillance state to conduct its operations. Perfect security can still be a long-term goal, but we need more realistic goals to encourage uptake in the meantime.

Comment: Re:its all about the $$$ (Score 1) 93

The law is generally stated that for two vehicles traveling in the same lane with no immediate changes before a collision, the trailing driver is at fault in case of a collision. However, it's a valid defense if the leading driver performed an unsafe maneuver prior to the collision, such as changing lanes with insufficient spacing.

Comment: Re:jessh (Score 1) 397

by Martin Blank (#48918307) Attached to: "Mammoth Snow Storm" Underwhelms

You're not factoring in the number of workers who would not have gone in anyway, the lost productivity from being late due to weather for at least some of those who did go in, potential losses to businesses that didn't shut down completely for paying employees to show up but who had little to no business that day, and the costs associated with personal and property damage due to accidents. It gets complex quickly.

Without government intervention, a lot of people would have simply gone in to work because they were afraid that if they didn't show up, they could be in trouble with their employers. When the city makes the call, it's easier to point to that as a justification, and it's more likely to be accepted by the employer.

Comment: Re:Displacing five times as much water... (Score 1) 116

by Martin Blank (#48623697) Attached to: New Cargo Ship Is 488 Meters Long

You would think with that volume of gas you would be up there with a nuclear sized detonation.

It has a capacity of some 430 million liters of LNG. At an average density of 0.463 kg/L at -160C, that's 199 million kilos of liquefied methane. At 22.2 MJ/L, that's 4.42 billion MJ, or a shade over a megaton of TNT if it were to all go off at once.

Though I doubt that's possible. The storage facilities will have separation, so at best there would be a chain that would dampen the impact somewhat.

Don't panic.