Please create an account to participate in the Slashdot moderation system


Forgot your password?

Comment Re:No biggy... (Score 1) 236

If you are looking for open source options you can try BlockParty - and Adios - You no longer need a developer's license to deploy software to your own iOS devices. I've been using Adios on a device that doesn't officially support content blocking (as per Apple's rules) and it works fine.

Comment Re:Wait for it... (Score 5, Insightful) 123

Watch the video. The SMS is actually an MMS or instant message and he's downloaded a file called "" to the desktop. He then double clicks on that, the dock disappears, and very quickly the "Allow" button is clicked. By default OS X machines come set to allow only Applications from the Mac App Store to run. Most people reduce this security setting to allow applications from "Mac App Store and identified developers" to run. Either way, you'd have to 1) Not notice that this is a .App and not a picture, and 2) Have disabled the default security settings. Otherwise you'd get a big warning saying "You can't open this because of security settings", which would be pretty hard to miss and then you'd have to ignore the warning, change your security settings, re-open the file, not even worry about what the dialog saying "Allow" is and ignore the fact that your dock flashed on and off for no reason.

I agree that you should be required to enter your password to access the keychain, but this is a guy from Beirut shilling for his password management company. Not only that, he doesn't mention which OS versions are affected or anything else. This could very easily be the NULL-pointer dereference exploit posted last week repackaged in a very clumsy way. If it is, why doesn't he say so? Post the exploit code at least so legitimate researchers can pick it apart.

If you run around turning off security features and running random .apps from people willy-nilly on your computer, no matter what OS you're running.

Comment Re:Back door? (Score 1) 54

Other major chip manufacturers will conduct their own reverse engineering or hire speciality chip patent infringement firms to map and analyze new chips from competitors. So a company like Samsung will do a fairly thorough teardown of new Intel chips and have a fairly detailed map. Not that a suitably clever backdoor couldn't be hidden from this type of scrutiny, it's not exactly the type of thing they're looking for. The always-on Cortana DSP is worrying and they've admitted to that, that could certainly serve as a backdoor with some degree of plausible deniability. The data collection centers the NSA has now are probably sufficient for the type mass data collection they want and they don't have the risk of potentially sabotaging one of the biggest US corporations. There is some level of peer review in chip manufacture and I doubt Intel would want to sabotage themselves in that way, or that the US government could legally obligate them to sabotage their chips in that way.

Comment Re:No, it doesn't (Score 1) 100

I'm viewing the hex on Mac OS X. I formatted a thumb drive, saved a newly created .docx file on it, ejected, connected to a Red Star 3.0 VM, opened the drive on Red Star, ejected and then connected back to OS X. The md5 and hex were exactly the same before and after. When I posted this to a thread on reddit the author came back to claim that the behavior didn't occur with .docx created in MS Word but did occur with .docx created in LibreOffice and with .jpg files. The .docx file I'd used in the first trial was created in MS Word so I repeated the process with a .docx from LibreOffice and a .jpeg file. Again the md5 and hex were exactly the same before and after connection to RS3.0.

Comment No, it doesn't (Score 4, Interesting) 100

Open in Red Star 3.0:

The above uses an MS Word document created in Office 2011.

I've tried jpg, docx created in MS Word, docx from LibreOffice, and numerous other random file formats copied onto my thumb drive - the MD5 remains exactly the same in every case.

Comment Re:Instead of building thin bendable phones... (Score 1) 152

Thinness and lightness are not some sort of exclusive point of marketability that only Apple users care about. These are guiding principles for technological development at almost every portable device manufacturer. You can look at the patent stream from Samsung and LG and see this quite easily, at least half of their portable device patents mention weight and thickness reduction. The manufacturers are not simply heading in this direction because they've decided that it's the cool thing to do, they perform market research and have determined that these are characteristics that play a major role in purchase decisions. This is also the reason that manufacturers increasingly use pouch batteries adhered to the case with adhesive. By removing the protective casing and screw mounts from the battery, they reduce weight and thickness. However, a pouch shaped battery is easily punctured and relies upon the hard exterior casing of the phone/tablet/laptop to protect it. If the manufacturers allowed consumers to simply pop their pouch batteries out and leave them sitting around to charge, they'd be liable when some consumers inevitably dropped something on the pouch, puncturing it and leading to a fire. Also, the increasing use of adhesives in place of bolts isn't isolated to portable devices, huge sections of the BMW i8 are now glued together where they would have been bolted in the past, while sacrificing consumer repairability, the weight reduction enables improvement in range as well as mileage.

Comment The Cloud (Score 4, Funny) 446

>Most people would just suggest to store it in "the cloud", but I'm naturally averse to doing so because that means someone else is responsible for my data and I could loose (sic) it to hackers, the entity going out of business, etc.

Simply strongly encrypt your data before backing it up to the cloud, you will be at no risk of hackers or anyone else gaining access that way. If you can't find a cloud storage service that you trust/trust won't go out of business, you can make your own cloud using Amazon's AWS system. The levels of security at the facilities and redundancy mean your data will survive anything short of nuclear Armageddon. Personally I'd just go with the local encryption option.

Comment Re:Organic compounds (Score 3, Insightful) 125

Are you referring to 2,3,3,3-Tetrafluoropropene? That HF production scenario involved Daimler spraying HFO-1234yf over a burning hot engine block. The conditions were tuned to disqualify it. There's a bit more to that story than the surface. German industry vs. US industry pushing different alternatives and each trying to warp the science their way. PVs aren't going to be aerosolized and sprayed over 500C engine blocks while mixed with compressor fluid. Considerably easier to predict the behavior of an organic molecule in this case.

Comment Re:Defintion of Pyramid Scheme (Score 2) 595

I think it's a pyramid scheme in the same sense Visa corporation is. It's a currency system indelibly tied to a payment processing system. The currency and the network for sending payment are fundamentally linked. This is a feature that is not shared by any other currency. Credit card processors presently extract huge sums of money from the economy to process payments and bitcoin dramatically reduces or eliminates those costs. I wouldn't accuse initial investors in Visa of colluding to create a pyramid scheme. Likewise I see early bitcoin adopters as investors in a novel mixed currency/payment processor. They go out and promote use and spread of bitcoin the same way any stockholder in a nascent credit card company would. It's just traditional investor-driven marketing.

Comment Features lacking in paper course materials... (Score 5, Interesting) 372

You can't highlight every piece of text, run a search on it and then spend hours jumping from one wikipedia article to the next, losing track of where you even started. You can't take a screen grab of an amusing typo, caption it, and post it to some social media network. No little bubbles pop up on your piece of paper to let you know you have a new instant message, email, completed download, software update or follower... Perhaps class in a Faraday cage isn't neo-Luddism, but a practical lesson in focusing on one thing at a time for 40 minutes straight.

COMPASS [for the CDC-6000 series] is the sort of assembler one expects from a corporation whose president codes in octal. -- J.N. Gray