Forgot your password?

+ - Voltage runs new art contest after ripping off submitters last year

Submitted by TheSHAD0W
TheSHAD0W (258774) writes "Voltage Entertainment USA, a company that primarily produces content for Japan, is running their 2014 art contest. (For a giggle, contrast the international version of the contest with the Japanese version.) They are promising $5,000 and 500,000 yen top awards, respectively, for the winners, with $1,000 and 100,000 yen awards for 3 runner-ups each. This is despite not awarding the top prizes for last year's submissions."

Comment: Meh. (Score 1) 277

Near as I can tell, this is equivalent to a system which stores the hashes in an encrypted form, except the encryption relies on the passwords of other users rather than an administrator's password. This may IMO make this system less secure, depending on how public the interface is; an attacker could sign up with multiple accounts on the system before grabbing a copy of the encrypted hashes. They would then have a set of passwords which could be used to validate additional ones.

Comment: Re:What good is it? (Score 1) 68

by TheSHAD0W (#45760517) Attached to: Throwable 36-Camera Ball Nearly Ready To Toss

I have a friend who will want one; she uses them for 3D rendering. Conventional panorama capture can have problems, like object and cloud movement, while the photos are being taken; this eliminates the issue.

I'd love to order one, but I have serious trust issues with Paypal and am not going to sign up just to join the campaign. I'll have to wait until it goes retail. Here's hopes the campaign succeeds!

Comment: not a scam (Score 1) 179

by TheSHAD0W (#45321399) Attached to: Amazon Botches Sales Tax, Overcharges NJ

It's unlikely Amazon would be scamming using this method; the fines involved would be horrendous. It would only take one person noticing to trigger an investigation and audit by the state.

From most of the responders to this thread, this is unlikely to also be a mistake. But even if it were, Amazon wouldn't be keeping the money, but would be handing it over to the NJ tax authorities. (That would also probably result in a fine, but not a catastrophic one.)


The Linux Backdoor Attempt of 2003 360

Posted by Unknown Lamer
from the alright-which-one-of-you-did-it dept.
Hugh Pickens DOT Com writes "Ed Felton writes about an incident, in 2003, in which someone tried to backdoor the Linux kernel. Back in 2003 Linux used BitKeeper to store the master copy of the Linux source code. If a developer wanted to propose a modification to the Linux code, they would submit their proposed change, and it would go through an organized approval process to decide whether the change would be accepted into the master code. But some people didn't like BitKeeper, so a second copy of the source code was kept in CVS. On November 5, 2003, Larry McAvoy noticed that there was a code change in the CVS copy that did not have a pointer to a record of approval. Investigation showed that the change had never been approved and, stranger yet, that this change did not appear in the primary BitKeeper repository at all. Further investigation determined that someone had apparently broken in electronically to the CVS server and inserted a small change to wait4: 'if ((options == (__WCLONE|__WALL)) && (current->uid = 0)) ...' A casual reading makes it look like innocuous error-checking code, but a careful reader would notice that, near the end of the first line, it said '= 0' rather than '== 0' so the effect of this code is to give root privileges to any piece of software that called wait4 in a particular way that is supposed to be invalid. In other words it's a classic backdoor. We don't know who it was that made the attempt—and we probably never will. But the attempt didn't work, because the Linux team was careful enough to notice that that this code was in the CVS repository without having gone through the normal approval process. 'Could this have been an NSA attack? Maybe. But there were many others who had the skill and motivation to carry out this attack,' writes Felton. 'Unless somebody confesses, or a smoking-gun document turns up, we'll never know.'"

Prof: So the American government went to IBM to come up with a data encryption standard and they came up with ... Student: EBCDIC!"