Slashdot videos: Now with more Slashdot!
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
The US model of the iPhone 5s/5c doesn't support band 7, which is technically used in the UK by EE:
I live in the UK and to be honest I wouldn't bother at all with 4G. It's only available in some city centres and practically speaking (i.e. for using on a phone) it's not really better than H+.
I wouldn't worry about it.
As noted in this report, Technological Protection Measures (TPMs) (i.e. CSS) are still protected:
"Consistent with the approach taken in relation to other exceptions, no reference to TPMs is made within draft Section 28B. Effective TPMs which prevent copying of copyright materials will however continue to be protected, separately to copyright protection, under Section 296ZA CDPA, and circumvention of such measures will continue to be prohibited."
Certainly with the FIPS device I use, there are 6 factory programmed 256 bit encryption keys stored in the device. All the pin code does is unlock the factory code that is currently in use in the encryption hardware. The encryption keys are not derived in any way from the pin code.
If you get the pin wrong 10 times then one of the encryption keys is erased and you move onto the next one. Once 6 have been erased, the device is permanently useless. This all happens well before any attempt to access the data via sata or any other means.
I have something similar and as you would expect, the encryption key is wiped after 10 PIN attempts, rendering the data useless.
Websites tricked users into activating malicious code by clicking on-screen phone numbers, Ravi Borgaonkar, from the Technical University Berlin, said.
No Android could tell the difference between actual phone numbers and USSD codes recognised by handsets as instructions to re-set or wipe its memory card, he wrote in a blog post.
Android maker Google has issued a fix.
Mr Borgaonkar is urging Android phone owners to ensure they have the latest updates."
Link to Original Source
The details of the challenge are almost certainly irrelevant - anyone can apply for GCHQ jobs directly with them, without having to complete a challenge.
The more their name is banded around forums and sites like slashdot the better, as they'll get more people applying for their jobs, which can only be good for them.
A linux build is available here. It's an firefox addon file (xpi). I have it up and running on Ubuntu fine. You'll need libpcap installed obviously.
You need to make sure you run firesheep-backend --fix-permissions as root manually before it'll work. You'll find this in Firefox's plugins directory.
All info taken from here.
Oliver Drage, 19, of Liverpool, was arrested in May 2009 by police tackling child sexual exploitation.
Police seized his computer but could not access material on it as it had a 50-character encryption password."
Link to Original Source
Standard passenger airports in the UK have used birds of prey for this purpose for decades...
I'm sure the same is probably true for airports all over the world.
I wouldn't be in any doubt that the Chinese would decide that it's illegal. You can't really just call it "Connecting to your home computer from China" when the only reason you're doing that is to circumvent their filter. It'd be a pretty feeble defence!