Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×

Comment: Ordered one (Score 2) 135

by WolfgangPG (#48277975) Attached to: Microsoft Enters the Wearables Market With 'Band'
I was considering a fitness band and went with this one. It is $199 and has more sensors than the iWatch or Fitbit charge. Seemed like a good deal to try out and it works with all the smartphones. http://www.neowin.net/news/spe...

It is pretty cool -- it has GPS, Heart beat monitor, sweat monitor, etc... hopefully it works well.

Comment: Re:ApplePay vs CurrentC (Score 2) 631

by WolfgangPG (#48254587) Attached to: Why CurrentC Will Beat Out Apple Pay
You don't think ApplePay or Google Wallet is collecting data?

Apple Pay is nothing standard. Who cares if it uses NFC or a QR code. You completely missed my point.
Apple Pay is completely a lock-in. If you want to use ApplePay you are locked into using Apple and Apple will be getting a cut from the credit companies, etc... There is nothing "standard" about Apple Pay.
Oh I forgot, I apple can do no wrong.

Comment: ApplePay vs CurrentC (Score -1, Flamebait) 631

by WolfgangPG (#48252317) Attached to: Why CurrentC Will Beat Out Apple Pay
I don't want ApplePay to win. That basically makes 1 Vendor control of the way we pay for things. No cool. Apple doesn't play nice with others and it would become their way or the highway.

At least with CurrentC it is a group of retailers all having to agree on a standard. It doesn't appear to be great and is something I probably won't use. But I would rather support something managed by a group of different people with vested interests vs 1 company.

Comment: Re:This just in, spy wants spy rules to stay (Score 5, Insightful) 316

I have to agree. The NSA may or may not have stopped any attacks with this snooping. They can of course point to attacks they claim to have stopped, but sadly we can't verify any of that. Instead we can point to the Boston Marathon Bombings where the US Government was informed by other countries to watch out for these guys and we still did nothing.

We also have the Fort Hood shooting. Where any Army person was using army computers to contact terrorists and went on to shoot up an army base. Where was the NSA there?

"Days after the shooting, reports in the media revealed that a Joint Terrorism Task Force had been aware of e-mail communications between Hasan and the Yemen-based cleric Anwar al-Awlaki, who had been monitored by the NSA as a security threat, and that Hasan's colleagues had been aware of his increasing radicalization for several years. The failure to prevent the shootings led the Defense Department and the FBI to commission investigations, and for Congress to hold hearings."

Comment: Re:privacy ? (Score 1) 132

by WolfgangPG (#43481385) Attached to: Microsoft Hops On Two-Factor Authentication Bandwagon
You can use Google's authenticator app or Microsoft's authenticator app. This was a typical poorly written summary on Slashdot. Anything MS does that is remotely positive was be half reported or not reported at all. http://arstechnica.com/security/2013/04/microsoft-rolls-out-standards-compliant-two-factor-authentication/

Comment: Re:Well to be fair (Score 1) 111

by WolfgangPG (#43432657) Attached to: Bing Tops Google At Finding Malware
Bing runs Server 2012.... Decent article about how Bing and Google are handling future search: http://arstechnica.com/information-technology/2012/06/inside-the-architecture-of-googles-knowledge-graph-and-microsofts-satori/ Bing was running Server 2012 even before it was released for sale... as stated by the AC.

Comment: Kindle does this too (Score 1) 264

by WolfgangPG (#42546913) Attached to: Nokia Admits Decrypting User Data Claiming It Isn't Looking
This seems like it will be common place as cloud based web rendering becomes popular to save people "bandwidth".

Kindle: http://www.zdnet.com/blog/networking/amazons-kindle-fire-silk-browser-has-serious-security-concerns/1516

Amazon Silk's terms and conditions state that Amazon will keep your the Web addresses you visit, the IP addresses you use, and your Kindle Fire's unique media access control (MAC) addresses for 30 days. With that information, Amazon can track your every Web move.

On top of that, when you lock into a site that uses Secure-Socket Layer (SSL) or HTTPS for security, EC2 will handle that for you as well. According to the Silk FAQ, "We will establish a secure connection from the cloud to the site owner on your behalf for page requests of sites using SSL (e.g. https://siteaddress.com./ Amazon Silk will facilitate a direct connection between your device and that site. Any security provided by these particular sites to their users would still exist."

Amazon will do this by acting as man-in-the-middle (MTM) SSL proxy. That's fine if you trust Amazon. I'm not sure I do. I'm not crazy about extending my trust to any large corporation. I have to trust my ISP, they connect me with the net, I don't want to extend my trust much farther than my ISP.

Is it possible that software is not like anything else, that it is meant to be discarded: that the whole point is to always see it as a soap bubble?

Working...