Please create an account to participate in the Slashdot moderation system


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Re:Wait ... (Score 5, Informative) 196

by Rosyna (#49094011) Attached to: A123 Sues Apple For Poaching Employees

A123 has had a number of problems, from their bankruptcy in 2012, their massive layoffs and executive bonuses, to later being purchased by a Chinese company and selling off their assets

Also, non-compete agreements are not valid in California. Even out-of-state NCAs are invalidated if the employee is to work at a CA company, (Exceptions if the employee is a stakeholder/partner/owner, which doesn't apply here).

Comment: Re:Strongly Worded... (Score 5, Informative) 62

by Rosyna (#49093093) Attached to: Samsung Takes On Apple Pay By Acquiring Mobile Wallet Startup LoopPay

Correct, LoopPay only works with existing magnetic swipe readers. LoopPay works by basically cloning the credit card. The LoopPay devices sends out a magnetic field that is picked up by the magstripe reader in the POS terminal.

LoopPay does not use NFC or RFID. Which also means it's great for those that want to commit credit card fraud since there is no verification or executable code to copy. Just load up the LoopPay device with multiple CC numbers, and see which ones work.

LoopPay also does not work unless there is a magstripe reader in the POS device. In October 2015, retailers in the US will start being liable for fraud committed via the magstripe reader, meaning retailers likely won't be willing to accept magstripe cards, such as those the LoopPay copies.

Comment: Re:Remember the down side (Score 1) 190

by Rosyna (#49032173) Attached to: Smartphone Theft Drops After Spread of Kill Switches

Remember the primary concern when these laws were proposed. As soon as criminals discover a way to maliciously activate the kill switch on a non-stolen phone, there will be serious fallout. Imagine the ransomware. There are similar concerns with law enforcement, who have demonstrated a desire to be able to wipe or forever disable a phone they've confiscated (usually one documenting their misdeeds).

And how would that work? The iPhone's activation lock is removed by entering the Apple ID/password that set up Find My iPhone on the device. You cannot change the username/password combo online (because the iPhone's activation lock doesn't use network access when triggered)

Comment: Re:well duh... (Score 1) 190

by Rosyna (#49032019) Attached to: Smartphone Theft Drops After Spread of Kill Switches

At least on iOS, it's not so much a "remote kill switch". That is, it cannot be triggered remotely. For iPhones, if you opt in, a setting is set on the phone that if the iPhone is erased a username/password is required to activate the phone again. While you can initiate a remote wipe, that wipe just causes the iPhone to respect the initial offline setting.

For users, it's better if the iPhone is not wiped because then it can still be tracked with Find My iPhone.

Comment: Re:Change in operations instead of cash.... (Score 1) 246

by Rosyna (#48500647) Attached to: 10-Year-Old iTunes DRM Lawsuit Heading To Trial

I don't know how I feel about this case. I avoided iTunes because I didn't like the two-faced approach of buying a license so you don't own the music, but if the device dies, you bought a file, we aren't obligated to let you retrieve the content that you have a license for.

You can download anything you've purchased again it's been that way for quite a while now.

Comment: Re:I don't get it... (Score 2) 98

by Rosyna (#48382901) Attached to: US Gov't Issues Alert About iOS "Masque Attack" Threat

All of those hoops are removed if the app is signed by an Apple 'enterprise deployment' certificate. Someone anyone can get just by asking.

No, those are all the hoops you have to go through to accept the "enterprise deployment" certificate profile the first time, then accept the app launching the first time. Also, the phone needs to be unlocked to accept any of these dialogs.

But then Apple can just revoke the cert (which it did for WireLurker) and blacklist the malware on the Mac side (which it also did for WireLurker).

Comment: Re:It's all about the Phone Number ID (Score 2, Informative) 136

by Rosyna (#48354055) Attached to: Apple Releases iMessage Deregistration Utility

The real issue is that you can't opt out of automatically having your phone number become and account/id in iMessage.

I want to use iMessage on my iPhone, but only with regular iCloud accounts, not with the phone number being used to create an account.

Unfortunately, the iOS team doesn't give the user that option.

The option is given when you set up a device for iMessage. It explicitly asks how you want to be contacted. By number, by email(s)/AppleIDs, or all of the above

Suburbia is where the developer bulldozes out the trees, then names the streets after them. -- Bill Vaughn