Forgot your password?
typodupeerror

Comment: Changelog : "Some Bug Fixing" (Score 1) 179

by doomy (#37879644) Attached to: Dolphin, a 3rd Party Android Browser, Relayed URL Data
Their app for iOS (Dolphin HD) got updated today with the following changelog "some bug fixing.", that is not transparency.

Regardless of the whole webzine thing, I'm concerned this developer was sending URL date of any site visited (banking, corporate, email etc ) in plain text to a server in China. There is a lot of data mining that can be done with URL data, specially older websites that stuff private date into URL.
Games

+ - Like a Redstone Cowboy->

Submitted by neonsignal
neonsignal (890658) writes "Machine creations in Minecraft are becoming increasingly complex as people build on each other's ideas. Some notable examples include a Rubik's cube simulator, a 5 channel music sequencer, a 3D color printer, a 16 bit processing unit, and Conway's Game of Life. My own recent contribution is the world's slowest Universal Turing Machine. I'm now waiting for someone to implement Tetris in redstone logic."
Link to Original Source
Science

+ - Scientists: Time Travel Impossible->

Submitted by smitty777
smitty777 (1612557) writes "Dr. Du Shengwang of the University of Hong Kong has performed a study he claims proves that nothing can travel faster than the speed of light, thus making time travel impossible. FTA, the team has "proved that a single photon, or unit of light, "obeys the traffic law of the universe."Einstein claimed that the speed of light was the traffic law of the universe or in simple language, nothing can travel faster than light," the university said on its website.""
Link to Original Source

Comment: Re:This wouldn't be a big deal except (Score 5, Insightful) 560

by doomy (#36861060) Attached to: Google+ Account Suspensions Over ToS Drawing Fire
The problem is that El Goog has almost no existing customer support service. If your account is compromised and or disabled by Google itself, there is no place to seek help. The only place you could ask for help would be the Google support forum, which is actually run by users, no one hangs around there that can do administrative level work. The next issue is that G+ has automated real name identification system and account an suspension system based on several automated features, currently due there is almost no way to appeal an account suspension due to a non-existing customer support system. To test this system try changing your name (preferably on a throwaway account) multiple times, you'd find out that it would automatically suspend access to your account once that passes a certain threshold. The biggest issue is that once someone creates a G+ account, all their existing Google content comes under that account, thus a suspension of the G+ account means goodbye to gmail, YouTube, blogger, Calendar and so on.. all content is disabled and it's almost impossible to get it back (unless you are a celebrity or your story gets published in media).

Comment: Re:Article and Video is misleading (Score 1) 127

by doomy (#36772318) Attached to: Exploiting the iPad's Glowing Keyboard
The problem with his article is sensationalism. This isn't an issue that's unique to the Apple iPad or iPhone, this application (and the core derivative) would work on any smart phone/tablet device. And.... best of all it can be adapted to work on even physical keyboards. Instead of taking the iOS tangent, he should have stuck with the movie theory and actually showed how this is possible using a physical keyboard (differential lighting on keypress .. or a keyboard with backlight etc). IMO that would be more impressive.

Comment: Re:Article and Video is misleading (Score 1) 127

by doomy (#36772286) Attached to: Exploiting the iPad's Glowing Keyboard
As I said before, if you read the PDF, he claims he started on this project cause the masked password entry was way too robust by default to exploit. I didn't feel that was the case as my own observation is different from what he claimed. The rest of what he did was excellent, not saying anything about that, I'm just saying his initial assertion that password entry masking was safe on iOS is invalid.

Can you show a screen of the iOS you run and password entry? I'd rather he showed these videos but it doesn't fit his article.

Comment: Re:Article and Video is misleading (Score 1) 127

by doomy (#36772224) Attached to: Exploiting the iPad's Glowing Keyboard
I'm sorry you feel that way. Could you show me a screenshot of your iPad with iOS 5 and the same screen (and which beta?). Also It's already been claimed this is iOS 4.3.x above. No offense, but I did my best to show you how this looked on my screen, I liked the study and the little application they made, but the whole thing has holes in it as said above.

Comment: Re:Article and Video is misleading (Score 1) 127

by doomy (#36772176) Attached to: Exploiting the iPad's Glowing Keyboard
I'm sorry are you the person behind this video? Yes, I do like to pull an article apart to see the validity of the claims. As far as I can see, this person's iPad is not behaving as mine does by default. I'm not sure if that's cause he has iOS5.0 as I do not use that. Yes, I admit the keyboard thing was an err on my part, as I was reading his PDF I realized this was about non-simple passcode entry. As far as the password showing up, it doesn't happen on mine (and as others said doesn't happen on their iPad's as well). The letters that show up are huge, it's very very easy to read it off, and they stick around for quite a bit, I could take two screenshots of a given passcode letter before it becomes a mask. I do like what he made, it's cool. But I wonder if he went this far on an assertion that was not completely true (ie. masked passwords cannot be read).

Comment: Re:Article and Video is misleading (Score 1) 127

by doomy (#36771944) Attached to: Exploiting the iPad's Glowing Keyboard
Yes, I tested it all out, there was no need for this extensive demonstration, as the assertion that password masking is completely hidden by default is incorrect (which is why they did the 2nd method). Their video's password entry does not work as it does on default on my iPad. On mine when I press a key, the key is momentarily shown on the line above before turning into a masked entry.

Comment: Re:Article and Video is misleading (Score 1) 127

by doomy (#36771930) Attached to: Exploiting the iPad's Glowing Keyboard
Ah, let me point out what came out bogus to me when I read the PDF.

The person claims this on page 3:

We have long realized the danger of having passwords stolen through shoulder surfing attacks which is why it is truly rate to find an application that fails to mask passwords on screen. Even the iDevices (which we examine below) mask passwords by default. We take the fact that password masking is so ubiquitous as the obvious acknowledgement of the shoulder surfing as a viable attack method.

Wait... This is where I have a problem, they claim that iOS masks the passwords by default and thus they have to use this other compelx method of capturing what keys are pressed. My problem with this video demonstration is that they didn't have to go that far, they just had to capture the password, but they assert it is already masked.

<<<<< EVACUATION ROUTE <<<<<

Working...