Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Re:Nokia (Score 2) 233

by Vapula (#49483775) Attached to: Google Responds To EU Antitrust Claims In Android Blog Post

Everytime I read about this non-sense about Android, I think about Apple.

- No competitng app store possible
- App competing with Apple removed from Apple App Store without any explanation
- iTunes locks similar to Google Account but made worse by supra
- Inability to install 3rd party firmware (cyanogen or other) ...

Why don't EU first attack the worst offender ?

Comment: Re:Public Key Cryptography is the key... (Score 1) 200

by Vapula (#49299709) Attached to: NZ Customs Wants Power To Require Passwords

There is no way you could remember a 4096 bits RSA key... Anyone in court will agree
If the files are encrypted using someone else's private key, there is no way that you can know or have that key... you only have the public key available. This could also be easily established in a court... You can't give out something that you never had access to in the first place...
The only more "sensible" part is about your private key that you didn't take with you... Even then, if they don't require you explicitely to have that key on your computer, they can't require that you hand it to you...

The one time pad idea is clearly an attempt to fold the system. You had to take the extra steps of generate it, split it in two parts, ... This is far more likely to send you to jail than not taking with you the USB-key on which your private key is stored...

Comment: Public Key Cryptography is the key... (Score 1) 200

by Vapula (#49299345) Attached to: NZ Customs Wants Power To Require Passwords

You want to bring some document to someone IN NZ, ask him to send you his PUBLIC key.
You want to be able to bring some document OUT OF NZ, keep your PUBLIC key on your computer.

And have NO PRIVATE KEY with you...

When asked to decrypt, you're just mathematically unable to do so... And any computer expert will be able to confirm what you say.

If enough people take that way, they'll eventually understand that it's futile to require password.

Comment: Re:Sorry They're Changing (Score 1) 572

by Vapula (#48224283) Attached to: FTDI Removes Driver From Windows Update That Bricked Cloned Chips

Except that this driver which disables the clones is only there for less than one month... before you had no way of detecting if the chip was a fake or not... Maybe even FTDI didn't know until recently when they found out that "write-check" weakness...

So, you may have been in business for years, sold hundred of thousand devices with the clone with no way to detect it... until this recent driver update...

Comment: Re:Alternatives? Same problem.. (Score 1) 572

by Vapula (#48224219) Attached to: FTDI Removes Driver From Windows Update That Bricked Cloned Chips

You should say to the buyer of a 1000$+ 3D Printer that if it's expensive tool stops to work, it's because a 2$ clone of a 3$ chip disabled by a driver update...

Do you open your printer and check the marking on all chips to see if any of them is a counterfeit ?

Don't forget that we are not speaking about a finished product (the 3D printer *IS* genuine) but a very small part inside of it... among many other similar small parts...

And no company is safe when it's about counterfeited components... Do you remind the Capacitor debacle with ASUS motherboards ?

I'm not even sure that refusing to work with a clone would be a valid solution...

Comment: Re:Alternatives? Same problem.. (Score 1) 572

by Vapula (#48224115) Attached to: FTDI Removes Driver From Windows Update That Bricked Cloned Chips

Their use of FTDI VID/PID is a way of saying "use the same driver than this device" and definitively not representing as an FTDI chip.

On the other way, many of these clones have printings that mimic the one of a genuine FTDI chip (same logo/reference number/...) and THAT is counterfeiting.

But they are free to make a clone, with a different printing, a different reference ("XXCloner CFT232R" for example) exposing the same VID/PID... they won't be authorized to use the USB certified logo (neither would the finished product). But if they are not pretending to be a FT232R from FTDI, it's definitively not counterfeilting.

VID/PID spoofing can't even be said as a way to breach copyright at the driver level as there are free drivers (Linux for example) that use the same VID/PID pair.

You may compare that VID/PID problem with Ethernet addresses... the first 3 bytes make a number assigned to a specific manufacturer. But lmots of hardware allow to change the ethernet address using another vendor number. It's very often seen in routers and Wifi-routers where it allows to show on the WAN port the Ethernet address of some LAN computer.

Comment: Re:Computer Missues Act 1990 (Score 1) 572

by Vapula (#48223425) Attached to: FTDI Removes Driver From Windows Update That Bricked Cloned Chips

Someone bought a device for their kid... that may be a complete device (toy for example) or one of these wonderful Arduino kits that you may find on EBay (with lots of sensors, components, ... a nice storage box, ...) That don't mean that he does know anything about electronics... My grand-father bought me my Tandy (Radio-Shack) Electronic kit when I was a boy and he didn't know anything about electronics (only basic electric circuits : mains -> switch -> light bulb).

And YOU (or FTDI) expect that he'll understand that if it stops working, it's because of a clone IC when he don't even know what is the difference between a resistor and a capacitor ?

Someone other bought a 800$ 3D printer... and suddently, it stops working because a 3$ chip inside is not a genuine one... And YOU expect that he'll be able to understand the issue and that he won't be angry at YOU for bricking his 800$ tool ???

The damage done to the clone is made intentionnally (doing something knowing that it'll hurt a clone and not affect an official IC is clearly intentionnal)... And the damage is not done to the vendor but to the consumer...

The move is clearly made with the intent to hurt the final (unknowing) consumer and not someone really responsible for the use of a clone. What is destroyed is not only one component but the whole thing it is enclosed into... And given the form factor, it's often beyond possible repair. Most people don't even have a soldering Iron, you except that they have a reflow oven to solder a new SMD part ?

What if Samsung (or Motorola) got a way to disable all radio subsystems in iPhones because iPhone non compliance with their mobile patent portfolio, making suddently all iPhone unable to connect to mobile network ?

Comment: "unlike competitors" ??? (Score 2) 504

by Vapula (#47937865) Attached to: Apple Will No Longer Unlock Most iPhones, iPads For Police

Nothing prevents you to use 3rd party encryption on your Android phone (and I'm not speaking about 3rd party system)... and I seriously doubt that Google will be able to do anything about data crypted by 3rd party system.

On Android, you work on a system of service provider/consumer. Your contact list ? you've an application acting as contact provider and other as contact consumer (reader/writers).... If you want to protect them, nothing prevents you to use a different default contact provider which uses an encrypted container. Same for most of the phone features...

On iPhone, you can only trust Apple's word... like we did when it was about geolocation data...

Comment: Patents cited in article (Score 4, Informative) 30

by Vapula (#47779231) Attached to: Judge Lucy Koh Rejects Apple's Quest For Anti-Samsung Injunction

The linked article cite the following patents :
- Auto-correction/completion on keyboard entry...
Il looks quite similar to the autocompletion that you find in some Japanese IME under Linux... which sometimes allow both conversion to kanjis and completion. Auto-correction is quite old on the wordprocessor scene
- transformation of email & phone numbers to link
AFAIK, most forums and webmails already convert email to link for a long long time. As for Phone number, the extension is quite trivial
- slide to unlock
it's mimicking a physical (door) lock... so nothing real new...

Maybe judge Koh has enough of these bogus patents claims and other similar tactics from Apple...

Comment: Re:It was bound to happen (Score 1) 163

by Vapula (#47454927) Attached to: 'Hidden From Google' Remembers the Sites Google Is Forced To Forget

In Belgium, you have a "certificate of good living and behaving" (approximate translation) that can be requested when you want to get a job.

Teachers (and other people who have to work with children) have to give a special version of that document. At first, it included some (very) invasive background checks (in the neighbourhood for example), now, it has been trimmed down... But if you've been a sex offender (or some other severe criminal records) in the past, you won't get it, even if you've had your records cleaned.

In about any countries, if you want some "top secret" accreditation, I don't think that it matters if your criminal records have been purged or the time has been served...

In these specific situation, there are no right to be forgotten...

Another problem may arise when the offender is minor (less than 18 years)... All records are hidden... I know of some school director (he explained this to me directly, it's not some vague rumor) who got a child put in his school by a court... He didn't know why (records sealed because it was a minor)... Until that guy did it again, in his new school... He was assaulting (sexually) younger children !!! But no way for the school to prevent it as they weren't allowe'd to know in the first place.

So, I think that for criminal offenses, there should NOT be a right to be forgotten... Minor offenses don't make it to the news anyway... Same for bad records related to the profession.

Comment: Re:I've always thought that the best way for Israe (Score 1, Insightful) 379

by Vapula (#47439389) Attached to: A Skeptical View of Israel's Iron Dome Rocket Defense System

Palestinians have an army...

Not regular army but a terrorism/guerilla kind of army...

If you count the prices of the missiles launched at Israel, you'd have enough to get food to most of the Palestinians, to repair most of the buildings, to create medic centers, schools, ...

And they prefer to create martyrs than go to a safe place when Israelian raids come... They want to get the whole world destroying Israel... They want to use US against Israel...

They prefer to choose war, to kill the Jews that are thought about as worse than dogs by the Muslims. Quran and other clearly say "you may not trust a non-muslim"... If you're Christian, better be warned, we are the next target on the list... well, maybe after agnostics...

Comment: Right to be forgotten... (Score 1) 210

First, I'd point that for many quite common names, you may find several people with same Name+Surname in Europe... sometimes hundred of people sharing the same name. So, what if John Doe A ask to remove some fact about John Doe B ? That's clearly impossible to google to judge about it.

I think that a quick "fix" to the problem would be Right to be cast in oblivion... Google just has to keep (in addition to removal of a specific link) a list of the people who asked to have their name removed and simply refuse any search with these names (no result, people cast into oblivion) with a big message "John Doe asked that links about him were removed from search results".

This would someone backfire to people asking such removal... You want to get a job ? recruiter try to look you up in Google and find that you asked to be removed from search results... and get told about it... that open any awful reason (sex offender ? serious misbehaviour ? other ?) and is likely to rule you out. You're a politician ? no publicity about you (except that "asked to be removed") is clearly worse that one or two old pages on the web about you... and so on...

And, somehow, google is complying : people want info about them removed... and that info is removed... And people get to know about who asked it (to be sure that's it's not an arbitraty removal).

IMHO, list of people who asked some removal SHOULD be public...

Have you ever noticed that the people who are always trying to tell you `there's a time for work and a time for play' never find the time for play?