Forgot your password?

Comment: Bitcoin users also MITM by exit nodes recently (Score 2) 126

by qubezz (#48224783) Attached to: Researcher Finds Tor Exit Node Adding Malware To Downloads

There have been several reports of Bitcoin users that use online wallets and exchanges, even over https, getting MITM attacked when using Tor. They visit the wallet site, get bad certificates but continue anyway, and poof, their Bitcoins in the service are gone and their passwords are known by the attacker. With recent SSL vulnerabilities or clever redirection, the cert errors could be avoided also. For other sites, users can be piped through a "universal phisher" to steal any credentials.

Clearly Tor users are under attack by exit nodes, many of them running automated tools against many web destinations.

Comment: Re:"not so much as a default wallpaper" (Score 4, Informative) 109

by qubezz (#48216807) Attached to: Ubuntu 14.10 Released With Ambitious Name, But Small Changes
If you want a significantly modernized UI that hasn't been designed for dummies, have a look at KDE Plasma 5. Kubuntu was simultaneously released in 14.10 flavor, and there are tech preview ISOs available now with the new desktop. It has a new wallpaper, also.

Comment: Re:As it is designed to do (Score 3, Insightful) 147

by qubezz (#48151929) Attached to: Data From Windows 10 Feedback Tool Exposes Problem Areas

It works as designed, however it works against the interest of the user. A perfect example is the unmovable and unremovable search button next to the start button that opens Bing search. Just like on Windows phones with a physical search button made useless because it cannot be configured to do anything but open Bing, this is just another operating system iteration that does what Microsoft wants, users be damned.

The best reply and what every user actually wants: "be Windows 7 after I disable all the bloat and UI garbage, libraries, and homegroup cruft you put on that OS".

+ - JP Morgan Chase Attacked; data for 76million stolen

Submitted by JakartaDean
JakartaDean (834076) writes "J.P. Morgan Chase said about 76 million households were affected by a cybersecurity attack on the bank this summer in one of the most sweeping disclosed breaches of a financial institution.

The largest U.S. bank by assets said the unknown attackers stole customers’ contact information—including names, email addresses, phone numbers and addresses. The breach, which was first disclosed in August and is still under investigation by the bank and law enforcement, extended to the bulk of the bank’s customer base, affecting an amount equivalent to two-thirds of American households. It also affected about seven million of J.P. Morgan’s small-business customers. It isn’t clear how many of those households are U.S.-based.

The bank said hackers were unable to gather detailed information on accounts, such as account numbers, passwords, Social Security numbers or dates of birth. Customer money is “safe,” the bank said in a statement to customers on Thursday."

+ - Google drops authorship with picture from search results.

Submitted by qubezz
qubezz (520511) writes "Did you notice the pictures of "experts" in your Google search results over the last few years? If a webmaster wanted a site to appear fancy and stand out in search results, a Google Plus profile had to link to your site, and pages recognized as articles needed continuous creation.

The "Authorship" feature, which rolled out in 2011 as another part of the Google+ social and real name marketing push, had its author profile pictures pulled from the search results in June this year. The remainder of the feature is now finally dead, with little fanfare.

Emil Protalinski at (note the importance of author?) reports:

Google today stopped showing authorship in search results, meaning articles will no longer include a link to the Google+ profile of their author. The company says that it found the information isn’t as useful to its users as it hoped, and in some cases even distracts from the overall search results.


Comment: Pot calling the kettle black (Score 1) 110

by qubezz (#47772227) Attached to: CenturyLink: Comcast Is Trying To Prevent Competition In Its Territories

Centurylink (which in this territory acquired Qwest, which was the local baby bell USWest after the AT&T breakup) does their own slimy anti-competitive tricks with their monopoly.

While DSL providers were required to allow third-party ISPs as a choice to customers (where the copper is Centurylink but the ISP is your choice), they limited the third party ISPs to 7mbps connections while rolling out their own ISP service at 30mbps. Whereas the ISPs provide professional and business class service, Centurylink's service is of course crummy PPPoE dialup with constant dropping and changing IP address, making it pretty much useless for anything except looking at web pages and impossible to use with most off the shelf network hardware.

They are hardly the ones to be speaking about preventing competition.

Comment: Re:And here I'm hoping... (Score 1) 681

Windows 8 has already made itself incompatible with most non-x64 processors anyway. It requires SSE2, PAE, and NX bit, which are features that CPUs, say a Pentium 4 Extreme Edition 3.46GHz or a Pentium 4 HT 571 3.8GHz, do not offer. Doesn't matter that you have 8GB of RAM and an SSD in them. Believe me, these CPUs are fine for just about any office task.

Windows 8 runs on crap tablet hardware but won't run on CPUs that can run MFLOPS around them due to a few CPU features.

Comment: TV and monitor manufacturers also (Score 1) 289

This has been happening for many years in computer monitors and televisions also. There will be an initial version sold for a few months that gets the reviews, and then the specs are changed - completely different LCD panels made by different manufacturers are substituted silently, often with different technology. Anecdotally early versions of an Acer monitor having a MPVA panel, and then the exact same model then shipping with TN panels that pale in performance compared to the original. With monitors, you are buying an AO Optronics panel in a box labeled Samsung, so when the same model gets you something inferior to both specifications and original reviews, it borders on fraud.

Comment: Re:Legacy file systems should be illegal (Score 1) 396

by qubezz (#47242871) Attached to: One Developer's Experience With Real Life Bitrot Under HFS+

The problem is, neither ZFS or Btrfs would have stopped an arbitrary bit inside an arbitrary file from becoming corrupt....

I think you should have a look at this 10 year old blog post:
ZFS can use single and double-parity (like RAID5 with two parity drives, but no failure if power is pulled during writing). In addition, it has bit scrubbing where all data is verified regularly.

+ - The Government Can No Longer Track Your Cell Phone Without a Warrant 1

Submitted by Jason Koebler
Jason Koebler (3528235) writes "The government cannot use cell phone location data as evidence in a criminal proceeding without first obtaining a warrant, an appeals court ruled today, in one of the most important privacy decisions in recent memory.
"In short, we hold that cell site location information is within the subscriber’s reasonable expectation of privacy," the United States Court of Appeals for the Eleventh Circuit ruled. "The obtaining of that data without a warrant is a Fourth Amendment violation.""

Comment: Re:like those are hard to see on teh intarwebs (Score 1) 110

by qubezz (#47207259) Attached to: GoDaddy Files For $100 Million IPO
And these scumbags even register and hold for ransom domain names put into their domain search tool. That's right - search to see if a domain is available using the Godaddy site, and it will be registered by Godady themselves or "partners", and sold off to the highest bidder, or suddenly have a $500 asking price.

Comment: No good comments? Not a comment worthy article. (Score 1) 120

by qubezz (#47181589) Attached to: Whom Must You Trust?

The linked article, which I did read, seems to have no thesis. It meanders from "C compilers can be subverted" to "see if people leave their purses out to judge if a neighborhood is safe". It is as if a high schooler had to write a paper on trust, and cut a paragraph out of each of the top 20 web search results.

Comment: Re:Thankful for the FOSS drivers on older hardware (Score 1) 134

by qubezz (#47169083) Attached to: Testing 65 Different GPUs On Linux With Open Source Drivers

The open source driver needs to be good; the latest version of the ATI proprietary driver has dropped support for relatively new cards - anything before HD 5000 series. This means that cards that include very good h.264 decoding engines such as the AMD Radeon HD 3850 256MB reviewed can no longer use the latest driver. In Ubuntu 14.04 this also means that trying the older last-supporting driver version no longer works, one would need to downgrade the x server version used in the distro.

This is one of the few cases where hardware on Linux becomes "obsolete" far sooner than it should because of lacking manufacturer's driver support (as opposed to many hardware devices like gameports, scanners, and printers that lost their Windows support in Vista but continue working on Linux). This will make me more wary not of Linux, but of the manufacturers that pull such shenanigans.

Comment: Re:Price a bit steep for lowest end platform (Score 1) 109

by qubezz (#47110453) Attached to: Firefox OS Powered Flame Available For Pre-order; Ships Globally

You can get an almost identically-specified Windows 8.1 Nokia Lumia 520 for $59.99, no contract. The only thing it's missing is a camera flash and a front-facing camera for video chats (Skype still works, it just points the wrong way.)

The latest developer rev of Windows Phone has word flow keyboard, which turns touch-screen typing from painfully intolerable to pretty cool.

Even Blackberry, giving it's Playbooks away to developers, couldn't get the adoption jump-started, so I don't know how an overpriced Firefox phone will succeed, although I would hope it would. Every other smartphone except for Blackberry wants to own your personal data and your life in their cloud and profit from everything sold in their store.

Whoever dies with the most toys wins.