Forgot your password?
typodupeerror

Comment: Maybe it's time to just teach it in school... (Score 1) 405

by Nogami_Saeko (#48142417) Attached to: Flight Attendants Want Stricter Gadget Rules Reinstated
If the whole safety briefing section is just covered in a standard school course "Safety for Air Travel", then we could probably dispense with the safety briefing altogether (not like it's changed much, if at all in the last couple of decades).

-Know where the exits are and the shortest way to get to them
-Know where the safety equipment is, and basic usage
-Keep your seatbelt on unless moving around, even if the light is off.

Comment: Re:If your encryption is secure, the key is the se (Score 1) 170

Use a key that's distributed and at least partially redundant. For example, break the key into 20 sections, and allow decryption with a minimum of at least 11 of those sections present.

Distribute the key sections to geographically diverse, trusted people, in different countries with different governments, with the instructions to keep them somewhere safe, and on a certain date (ie: Jan 1, 2020) publish them online in a known location.

Sure, some people might be jerks, or accidentally publish ahead of time (or not at all), but assuming that (in this case) 55% of the keys are available, the file can be unlocked. Of course, you could change the number of key sections required based on how critical secrecy is vs. security, etc.

Comment: Re:Cell phones must stop broadcasting MAC addresse (Score 1) 189

by Nogami_Saeko (#44543379) Attached to: Londoners Tracked By Advertising Firm's Trash Cans
Is there any particular reason that MAC addresses need to be (typically) hard-coded to the device? I know it's occasionally handy on physical networks for addressing specific devices for admin reasons, but on portable, wireless connections, seems like more trouble than it's worth.

Why not just have an option to let the device randomly roll a new MAC each time it connects? If it's already in use (highly unlikely), just roll a new one.

(note: I know you can authorize access to specific MAC addresses through many routers/switches/base stations, but it's flimsy security at best as many adapters can have their MACs changed through software).

Comment: Re:Gotta love those mistakes... (Score 1) 165

by Nogami_Saeko (#44278285) Attached to: Database Loophole Lets Legislators Avoid Photo Radar Tickets
I suspect that they issue the plates under a different jurisdiction, the same way that if you had plates from another state or country, there could be an overlap in the plate numbers.

One plate for the public, another for politicians - after all, they do seem to live in their own little world.

Comment: Macs are already a lot safer... (Score 1) 282

by Nogami_Saeko (#43937107) Attached to: It's Time To Start Taking Stolen Phones Seriously
Here's the thing that annoys me - Apple *already* has this technology for all Mac computers built after 2011.

There's no way to override the firmware password on newer Macs - you used to be able to do all sorts of tricks like removing a memory module, or manually accessing the NVRAM parameters. Now owners need to press the "secret keypress" (or bring to an Apple authorized retailer), read an encrypted keycode off of the monitor (probably based on the current password and the hardware ID of that particular system), go into the Apple store and prove you're the owner, and Apple Employees contact Apple HQ to generate an unlock USB key for you.

It would be exceedingly simple for them to implement the same thing in phones. Phone locked? Need to bring to an Apple store to prove ownership before unlocking (probably also wipe the filesystem encryption key, so the phone's contents are not revealed). Make it check the lock status in firmware as part of the bootloader so even a manual DFU needs to unlock first to prevent smarter thieves from just re-flashing the phone (come to think of it, with the new firmware security and signed blobs, this should already be possible - if a phone is reported stolen, simply refuse to sign a firmware-blob for reflash).

A "half-way" position would be to allow the phone to unlock if you connect it to a computer you've synced with.

To encourage people to use the lock (who typically don't like unlocking every 15 min or whatever), have a minimum requirement to enter the password once whenever the phone starts, so while someone may still steal your phone, if it's ever turned-off, battery runs out, or is reset, it requires the unlock code be entered.

Comment: Re:DaisyChain (Score 1) 405

by Nogami_Saeko (#40948413) Attached to: Ask Slashdot: Simple Way To Backup 24TB of Data Onto USB HDDs ?
Curious what that problem could have been - Drobos aren't fast, but at 1MB/s, something is seriously wrong.

Mine has 8TB of storage currently and the transfer rate is about 30MB/s. Not fast, but quick enough for media storage and such. That said, I'd probably buy Synology hardware in the future as it is quite a bit faster, less expensive and more versatile.

N.

Comment: Re:Just like their trains... (Score 1) 389

It's an overgeneralization to say that Chinese buildings are crap - but there are some elements of truth in it, depending where you go. For example, downtown Shanghai has construction that looks on-par with any other major metropolis.

By contrast, areas outside of Shanghai in the more industrial/manufacturing centres had a construction quality that I'd generalize as "good enough", both for industrial complexes and housing. Visiting friends there, there were many elements of the construction that I would say were "sloppy". Probably not crap, but not created with a lot of care and attention to detail.

"Irrationality is the square root of all evil" -- Douglas Hofstadter

Working...