Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
For the out-of-band Slashdot experience (mostly headlines), follow us on Twitter, or Facebook. ×

Comment: Maybe it's time to just teach it in school... (Score 1) 406 406

If the whole safety briefing section is just covered in a standard school course "Safety for Air Travel", then we could probably dispense with the safety briefing altogether (not like it's changed much, if at all in the last couple of decades).

-Know where the exits are and the shortest way to get to them
-Know where the safety equipment is, and basic usage
-Keep your seatbelt on unless moving around, even if the light is off.

Comment: Re:If your encryption is secure, the key is the se (Score 1) 170 170

Use a key that's distributed and at least partially redundant. For example, break the key into 20 sections, and allow decryption with a minimum of at least 11 of those sections present.

Distribute the key sections to geographically diverse, trusted people, in different countries with different governments, with the instructions to keep them somewhere safe, and on a certain date (ie: Jan 1, 2020) publish them online in a known location.

Sure, some people might be jerks, or accidentally publish ahead of time (or not at all), but assuming that (in this case) 55% of the keys are available, the file can be unlocked. Of course, you could change the number of key sections required based on how critical secrecy is vs. security, etc.

Comment: Re:Cell phones must stop broadcasting MAC addresse (Score 1) 189 189

Is there any particular reason that MAC addresses need to be (typically) hard-coded to the device? I know it's occasionally handy on physical networks for addressing specific devices for admin reasons, but on portable, wireless connections, seems like more trouble than it's worth.

Why not just have an option to let the device randomly roll a new MAC each time it connects? If it's already in use (highly unlikely), just roll a new one.

(note: I know you can authorize access to specific MAC addresses through many routers/switches/base stations, but it's flimsy security at best as many adapters can have their MACs changed through software).

Comment: Re:Gotta love those mistakes... (Score 1) 165 165

I suspect that they issue the plates under a different jurisdiction, the same way that if you had plates from another state or country, there could be an overlap in the plate numbers.

One plate for the public, another for politicians - after all, they do seem to live in their own little world.

Comment: Macs are already a lot safer... (Score 1) 282 282

Here's the thing that annoys me - Apple *already* has this technology for all Mac computers built after 2011.

There's no way to override the firmware password on newer Macs - you used to be able to do all sorts of tricks like removing a memory module, or manually accessing the NVRAM parameters. Now owners need to press the "secret keypress" (or bring to an Apple authorized retailer), read an encrypted keycode off of the monitor (probably based on the current password and the hardware ID of that particular system), go into the Apple store and prove you're the owner, and Apple Employees contact Apple HQ to generate an unlock USB key for you.

It would be exceedingly simple for them to implement the same thing in phones. Phone locked? Need to bring to an Apple store to prove ownership before unlocking (probably also wipe the filesystem encryption key, so the phone's contents are not revealed). Make it check the lock status in firmware as part of the bootloader so even a manual DFU needs to unlock first to prevent smarter thieves from just re-flashing the phone (come to think of it, with the new firmware security and signed blobs, this should already be possible - if a phone is reported stolen, simply refuse to sign a firmware-blob for reflash).

A "half-way" position would be to allow the phone to unlock if you connect it to a computer you've synced with.

To encourage people to use the lock (who typically don't like unlocking every 15 min or whatever), have a minimum requirement to enter the password once whenever the phone starts, so while someone may still steal your phone, if it's ever turned-off, battery runs out, or is reset, it requires the unlock code be entered.

Comment: LCARS (Score 1) 131 131

Just noticed the LCARS marking on their website and it occurred to me that the LCARS interface, designed back in the late '80s to look futuristic, is starting to look pretty dated now.

Only when you look at the dates that you realize that the series is 25 years old now. I feel old :P

N.

Comment: Re:DaisyChain (Score 1) 405 405

Curious what that problem could have been - Drobos aren't fast, but at 1MB/s, something is seriously wrong.

Mine has 8TB of storage currently and the transfer rate is about 30MB/s. Not fast, but quick enough for media storage and such. That said, I'd probably buy Synology hardware in the future as it is quite a bit faster, less expensive and more versatile.

N.

Comment: Re:Just like their trains... (Score 1) 389 389

It's an overgeneralization to say that Chinese buildings are crap - but there are some elements of truth in it, depending where you go. For example, downtown Shanghai has construction that looks on-par with any other major metropolis.

By contrast, areas outside of Shanghai in the more industrial/manufacturing centres had a construction quality that I'd generalize as "good enough", both for industrial complexes and housing. Visiting friends there, there were many elements of the construction that I would say were "sloppy". Probably not crap, but not created with a lot of care and attention to detail.

"This is lemma 1.1. We start a new chapter so the numbers all go back to one." -- Prof. Seager, C&O 351

Working...