Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?

+ - Slashdot blocked in Switzerland (Possibly other parts of Europe) 1

Submitted by Wattos
Wattos writes: On my daily commute to work, it is my habit to check several websites for the latest news. Imagine how surprised I was that when was not accessible anymore. Instead I received a 403 Restricted error page. Initially I thought that this would have been a simple mistake by my mobile ISP, so I connected to my home VPN. Slashdot was blocked including many links to websites with vpn services. After connecting to a VPN provider outside of the country (in Poland) slashdot was accessible again.

Comment: Re:Wow ... (Score 1) 191

by Wattos (#44318073) Attached to: Blackberry 10 Sends Full Email Account Credentials To RIM

You show a good example. Would you still think that this model is better if:

1) The post man can read your mail without you noticing (e.g. the envelope is never damaged)
2) You have to provide your postman with a key to open your locker? The key might additionally fit into your other lockers (e.g. A lot of people reuse their passwords)
3) The postman can easily store copies of all the letters you receive without you knowing
4) The postman travels from your local post office, to a completely different country, where the correspondence may be inspected by the other government at will without you even knowing and then gives you the letter.

Once you consider these points, you might not like that approach unless you completely trust your postman.

Comment: Re:Well yes but, (Score 2) 459

by Wattos (#43205011) Attached to: 41 Months In Prison For Man Who Leaked AT&T iPad Email Addresses

If you find my key under a rock in my backyard, it is still theft if you break into my house with it and steal things.

The analogy is not really applicable. This is more like writing all your secrets into a notebook and putting it into a library (in a section accessible to everyone). Then you sue the person who found the notebook.

Leaving the data open to any web request is the true crime here. I do not know about the US, but in Europe that would have been a violation against the Data Protection Act.

Comment: Why is this even on Slashdot (Score 0) 128

by Wattos (#41682669) Attached to: Steam Protocol Opens PCs to Remote Code Execution

From TFA:

Our choice for exploiting this bug is to create a .bat file in the Startup folder of
the user account which will execute our commands injected through +echo at the
next login of the user on the system. There is also an interesting scenario against
dedicated servers by specifying the motd.txt of the game as logfile and launching
the cvarlist command that will dump all the game variables in such file that is
visible to any player who joins the server. Team Fortress 28 is one of the most
played games based on this engine and it’s free-to-play.

They system is already compromised at this point. Why do we need the steam protocol?

Also, for the love of god, please stop calling these people security researchers.

Comment: Why limit ourselves to the controller? (Score 1) 81

by Wattos (#41682283) Attached to: Sony Files Patent For Temperature Feedback Move Controller

Why is Sony limiting this technology to the controller? The PS4 should actually come with an air conditioner changing the temperature in the room. So if the character is in a cold environment, you should be freezing. Similarly, they should also include a flame thrower in the PS4, so that when you get hit by a fire spell in the game, you actually start burning. That would be totally immersive!

Air is water with holes in it.