Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
Slashdot Deals: Deal of the Day - Pay What You Want for the Learn to Code Bundle, includes AngularJS, Python, HTML5, Ruby, and more. ×

Comment Shazam type apps? (Score 1) 223

Could this be built into phone apps like Shazam? Shazam needs microphone access. That app seems built for collecting information for advertisers so it seems a likely candidate to me. There are lots of popular phone apps that request mic access even on iOS: Skype, Telegram, Dolphin Browser, Shazam, Snapchat, Instagram, etc. We need a way to tell which apps are doing this.

It also appears that even on iOS if you give an app microphone access then the app can access the microphone in the background:

Comment Disinformation? (Score 3, Interesting) 306

I wonder if these fights are just disinformation to try to convince criminals/terrorists that they can use iMessage. The government lets a criminal get away with it in a case they don't really care about or can convict them without it anyways and makes a lot of press, and then has access to it in all the cases they do care about.

iMessage is designed with warrants in mind if you read over the protocol documentation. Each device has its own key and is tied to your Apple Id. If you have a iPhone, a Macbook, and an iPad each device has its own encryption key. When someone sends you an iMessage, Apples sends them the public key for each of the 3 devices and then the encrypted message is sent to each device which uses its private key to decrypt the message.

When a warrant is issued, all Apple has to do is add a 4th, "FBI device" to your Apple Id and anyone sending you an iMessage also gets encrypted with that key.

As Apple controls the user interface and they provide no way to view how many keys an iMessage is being encrypted with, there is no easy way to see if an extra key for ease-dropping is being used. There may be ways if one monitored the size of the traffic, but I am not aware of that work being done. Anyone who had the need to make sure they weren't being spied on by the government, wouldn't use iMessage.

Comment fix10 (Score 1) 492

I found the following instructions:

It looks like it gets everything that is currently known about, but no idea how much spyware is hidden in Windows 10 that isn't known about yet.

The link above actually contains 0 trackers according to Privacy Badger, one of the few Web sites where that has been the case.

There is a tool that was mentioned on Fox News (I don't watch, but I heard about it), DoNotSpy10 by pxc-coding, that is supposed to make it easy. Of course DoNotSpy10's installer itself contains spyware (OpenCandy), so using a tool to remove spyware that installs spyware is just lame.

Comment Re:How good is it? (Score 1) 136

And of course, some people are saying that DoNotSpy10 itself contains spyware in its installer (OpenCandy):

It is not open source, and does not appear to be trustworthy.

I think it is probably much safer to just follow instructions for oneself, like these:

Comment Re:Get What You Pay For (Score 1) 163

ISPs are like all you can eat restaurants. In your example it would be like an all you can eat restaurant making enough food for one person and letting 1 million through the door. They have to estimate what the average person eats and make sure there is enough food for everyone they let through the door.

The difference is that most all you can eat restaurants will start turning people away at the door when they know they are going to run out of food. ISPs just keep selling to more customers even when they know they don't have enough bandwidth.

Comment This is probably not the site you are looking for (Score 2) 148

Anyone else getting "This is probably not the site you are looking for" at the top of the page, and at the bottom of the page after the blog it says:

"You attempted to reach, but instead you actually reached a server identifying itself as a shape shifter humanoid reptile alien. This may be caused by a misconfiguration on the server or something more serious. An attacker on your network could be trying to get you to visit a fake (and definitely harmful) version of You should not proceed."

The SSL certificate matches so according to my browser I am going to the correct site. I am not sure if this is meant to be humor or if there is some sort of additional interception detection. I have no idea what it would be doing beyond the SSL checks?

Comment Re:most biometric sensors have significant issues (Score 1) 127

It is my understanding that retinal scans can be effected by health conditions. Pregnancy, diabetes, glaucoma, retinal degenerative disorder, AIDS, syphilis, malaria, chicken pox, lyme disease, leukemia, lympoma, sickle cell, congestive heart failure, atherosclerosis, and significant cholesterol change can all apparently cause a retinal scan to change. While some employees may find detection of these conditions as a good thing, other employees may find it invasive.

Research seems to indicate that iris scans change over time. Companies that use Iris scanners need to rescan everyone every year or they get false negatives, which may or may not be an issue.

I think using an ID card scan like was mentioned above, makes the most sense.

Submission + - CA Court Rules Businesses Must Reimburse Cell Phone Bills

dszd0g writes: The Court of Appeal of the State of California has ruled in Cochran v. Schwan's Home Service that California Businesses must reimburse employees who BYOD for work. "We hold that when employees must use their personal cell phones for work-related calls, Labor Code section 2802 requires the employer to reimburse them. Whether the employees have cell phone plans with unlimited minutes or limited minutes, the reimbursement owed is a reasonable percentage of their cell phone bills." Forbes recommends businesses that require cell phone use for employees either provide cell phones to employees or establish forms for reimbursement, and that businesses that do not require cell phones establish a formal policy.

Submission + - NSA Puts Wastewater to Use

dszd0g writes: The National Security Agency will be using wastewater to cool its new Maryland data center according to Government Computing News. Instead of giving us crap, they are putting it to use. Or do they just want more crap to examine?

Comment Re:'no definitive conclusions can be reached' (Score 2) 341

What we know about GMOs is that there are no known examples of harm caused by them that can be reproduced by scientific peers.

You mean like Monsanto's Newleaf Potatoes?

There was first the Dr. Arpad Pusztai study that showed it caused "damage to the intestines and immune systems of rats fed the genetically modified potatoes."

Industry and the Royal Society of Medicine declared Dr. Arpad's study flawed and his study was considered discredited.

Then it turns out the Russian Academy of Medical Sciences had conducted a similar study that found similar results. Except this study had been suppressed by Monsanto for 8 years.

Major US food companies, like McDonald's and Frito-Lay, used Newleaf Potatoes for a few years before consumers complained about GMO "frankenfries."

It would be one thing if GMOs were being developed to taste better, grow larger, etc. However, most GMOs that are being developed either seem to be for either producing their own pesticides or to allow more pesticides to be used on them. It's not complex logic that putting new and more poisons on our food could cause us harm. Especially, when so many studies are coming out linking various diseases to pesticide use. Slashdot just recently an article linking Parkinson's to pesticide ( Pesticides have been linked to being a cause of Autism ( and other diseases.

Comment Re:Heat related? (Score 2) 190

As single event upsets (SEU) are caused by cosmic particles which create alpha particles. It makes sense that equipment higher in the rack would absorb more of the alpha particles and block them from systems lower in the rack, but I am not a physicist. Alpha particles are relatively easy to block with shielding.

As the link said, this was first theorized in 1978 and supercomputer companies have been designing systems with this in mind for decades.

I have a theory that it's impossible to prove anything, but I can't prove it.