Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment: Re:install applications, CAs, encrypt storage, set (Score 1) 184

by drkstr1 (#48851765) Attached to: Ask Slashdot: Can I Trust Android Rooting Tools?

It's strange to me that there aren't many options to buy phones pre-rooted. Considering how much I value my free time and how little I want to risk bricking my new device, I would easily pay an extra $50-100 for a phone that was both rooted and under warranty. I imagine even less tech-savvy people could be sold on the idea by just demonstrating the new "features" that you gain.

My understanding is that licensing restrictions prevent o e from shipping an android device that includes any of the useful proprietary bits from google, unless you are an "approved" manufacturer. I believe this is why Cyanogen mod had to make some concessions in order to ship a product that can be sold outside the grey market.

Comment: Re:Spoofing! (Score 1) 199

by drkstr1 (#48849261) Attached to: Insurance Company Dongles Don't Offer Much Assurance Against Hacking
No, that is what we get in now in the current hegemony. The i would even say the system we have now in practice was designed so the liars thieves and fraudsters can gain an unfair advantage. This is why income is unnaturally distributed to the top, rather than a nice clean bell curve, as it should be, according to natural law. What I am proposing simply boils down to a change in our priorities. One that puts the persuit of knowledge, truth, and honesty above all else. All of that behavior you describe could easily be weeded out in such a system, as no one would have any exceptional advantage over anoter. The common man is more capable than you give them credit for. Let's create a system designed for them.

Comment: Re:Spoofing! (Score 1) 199

by drkstr1 (#48848347) Attached to: Insurance Company Dongles Don't Offer Much Assurance Against Hacking
PS. The merits would be a more level playing field and upward mobility, and quality of life, at the possible expense of economic efficeincy. But I would argue we are in an age where economic efficiency is no longer needed to improve our quality of life, and may even be detrimental to our long term survival as a species.

Comment: Re:Spoofing! (Score 1) 199

by drkstr1 (#48848321) Attached to: Insurance Company Dongles Don't Offer Much Assurance Against Hacking
Simple. Keep capitalism. Make it so ideas and information can't be owned (copyright is OK, but affords no additional protection except for maybe the right to citation to prevent plagerisim aka fraud). In fact, let's just get rid of all the laws except for maybe a few hundred or so. The laws that we keep should be more like commandments (EG though shall not defraud another when entering into a contract). People should not be regulated. Incorporated persons should be regulated only when and if they interfere with the free market (eg. monopoly abuse, fraud, deception, etc). Let the people weed out bad behavior/ideas naturally.

Comment: Re:Spoofing! (Score 1) 199

by drkstr1 (#48847699) Attached to: Insurance Company Dongles Don't Offer Much Assurance Against Hacking
TTWTF is that this is the 20th century thinking that makes such an act illegal (or even considered to be immoral). Insurance companies should be free to price their policies in any manor of their choosing, and we the people should be free to share and spread information to subvert their dirty tricks. Capitalism (as it is practiced) is not suited for the 21st century. It's time for a new economic structure, condusive to an open and free market place of ideas. 20th century thinking needs to die.

Comment: Re:Windows (Score 1) 203

by drkstr1 (#48726611) Attached to: Why Aren't We Using SSH For Everything?

If anything is missing, it's probably only missing on Windows.

Support on Linux and Mac is jut fine, I think.

Exactly. I have used ssh for "everything" for a decade and half already. Moving files, remote word processing across town, accessing email. Anything goes when you can forward X. Might be tricker with windows - but I don't do windows and haven't used it since version 3.1.

How do you get around the lag issue? Even on a good connection down the street from my office, the lag is unbearable for me. One thing I thought might help (if anyone knows how) is to turn down the eye candy when forwarding X. If anyone has any insight on the issue, please share!

Comment: Re:uh - by design? (Score 1) 163

by drkstr1 (#48667323) Attached to: Thunderbolt Rootkit Vector
I didn't claim it was wrong, only that it was useless and full of hot air ...although I may be using that expression wrong... I usually use it for the occasional "know it all" techies I come across who like to use big words to confuse the shit out of non-techies, so they can hide the fact they are a know-nothing hack. Maybe this is not the case for AC, but all signs point to yes.

Comment: Re:uh - by design? (Score 1) 163

by drkstr1 (#48665461) Attached to: Thunderbolt Rootkit Vector

I have on several occasions recovered a working system from an infected boot rom, but it was not easy nor was it straightforward in any sense of the word. Agreed however that if a boot rom is infected most computer techs without a high degree of sophistication and skills will not know how to proceed.

This is an example of what I refer to as "A nearly perfect hack" (analogous to the concept of the perfect murder, leaving little to no evidence allowing the individual committing it to get away Scott free.) In this case you have a low level hardware component as an infection vector and the infection could potentially compromise the information security of the entire system without giving itself away to a malware scanner or virus detection. Even if some of the behavior of the infected system matches a pattern similar to a known root kit or virus or malware on secondary storage, detection and cleaning is confounded by the fact that the infection can re-occur and detection can be confounded by one not being able to trust the data integrity of the machine at runtime in such an infected system. The main takeaway is that the root infection is not where one would normally look for it, on secondary storage or in RAM. Fixing such a thing, in a nutshell, requires being able to examine the system component by component at the hardware level on a non running system which is a somewhat complicated and more involved process than a malware or virus removal or giving up and just re-imaging the system. There are tools to carry out such diagnostics and repairs but it is more in the realm of a digital electronics hardware expert than in the skill set of the average IT Tech.

Your first paragraph had me interested. Your second made me realize you're full of hot air. Eg. Long, overly complex, and unnecessary vocabulary. I presume to hide the fact that you offer no real insight on solving the problem.

I'm not a hardware guy, so I would I appreciate if a real expert would chime in here and ease my curiosity.

Comment: Re:I wonder if... (Score 1) 435

by drkstr1 (#48619655) Attached to: In Breakthrough, US and Cuba To Resume Diplomatic Relations

The 'older' exiled Cubans in America were never going to 'authorize' this. That Obama did, was, aside from the true purpose of stopping the absurdity that has been in place, a play to the youner generation of Cuban exiles that are in Florida and elsewhere that are of voting age. They're the ones this will affect in the coming generation, and not the ones who will die off in the next decade.

Politically, anyone who is damning this decision is an isolationist shill who prefers punishment, rather than progress. THAT, is 20th century thinking, and needs to be squashed hard and fast!

Cheers AC!

Where there's a will, there's an Inheritance Tax.

Working...