Forgot your password?
typodupeerror

Comment Re:Watched the livestream (Score 2) 53

I'd assume they were using VHF radios -- since that's what the Navy uses for most of those types of operations, especially if they have divers involved. The VHF radios are line-of-sight so I would assume they would have some sort of antenna cluster on the module. Could be that it got knocked loose, radio connector became loose or just something else like that. Since they were getting traffic, one would assume everything else was setup right.

Comment It's not only websites that use TLS (Score 1) 114

As the CA/Browser forum said in their response to this, they feel automation is the key. Protocols like ACME do exist, but really only exist for web servers.

People forget that it's more than websites that exist on the internet that use PKI infrastructure. Your printer sitting on your desk -- that's got embedded certs. Have a phone? Yup, that has certs loaded into it as well to do encrypted phone calls. LDAP servers, directory servers, mail servers, API servers, game servers, etc. Hell, that IoT lightbulb has a cert it in, I bet (or you hope it does, if it exposes https). I know I do TLS encrypted between my phone system and my carrier -- it works well but when certs change, stuff breaks because that stuff is hyper-sensitive to MiTM attacks where you need to trust an individual cert for a period of time.

This is going to leave all those devices that aren't traditional apache/nginx/IIS web servers to have a few options:
  - Issue private, unsigned certs that have longer validity. Expect users to directly trust those certs (or instruct them to click through errors). This is a huge step backwards and teaches our users to ignore earning when things are wrong.
  - Issue certs from a private CA that allows you to control the validity. You then have to teach your users to import the root cert onto every device they plan to use (this is /really/ hard on mobile devices). This works until you need to hit those resources with a web browser, and Safari/Google start to block certs that have validity that is longer than 45 days (and we've seen this in the past when certs went from 3 years down to 1 year).
  - Hope that /every/ manufacture puts in cert and key rotation into all their products in the next two years. Even then, how do you validate all those certs for these smaller devices that aren't or shouldn't be publicly accessible on the internet.

Comment Re:It's multiple problems (Score 1) 195

Auto-detecting oncoming cars is already a feature in higher-end cars in the US. It's also highly inaccurate as designed (it will detect oncoming cars most of the time -- assuming there are no hills, ice, snow, rain, etc), and does not help with pedestrians, cyclists, motorcyclists and other road users.

Comment Re:Don't people dip their lights (Score 1) 195

I've got a co-worker who drives around with the high-beams on all the time. Their new Buick uses the front-facing sensors to determine if a car is coming or if they are following a car. It auto-drops them when it detects a car, so they so it as 'auto mode'.

It does not detect pedestrians, cyclists or any other road users. It detects other cars most of the time. They don't care -- they bought the feature.

Comment Re:To be fair (Score 1) 363

In the Valley, drinking was normalized. Hell, even at the eBay/PayPal complex (which was one of the more straight-laced places in San Jose), beer taps turned on at 5pm and people would regularly grab a few and head back to their desks. At Adobe, it wasn't uncommon for all the managers to have bourbon or whisky at their desks. At Intel, there wasn't a ton of booze out there in the open, but all the engineers I knew in the early 2000's had at least two drinks at lunch before they came back to the office.

Comment Re:How about cyclists respect the laws? (Score 1) 210

Fun. How many times did you go over the speed limit. I'm talking 46 in a 45 zone or faster than 25 in a residential neighborhood? 1 over is breaking the law.
How many times do you roll a stop sign? Stopping means /completely/ stopped, not just slowed down.
How many times do you right-on-red without completely stopping? Block a cross walk? Run a yellow or red light (I know... it changed quick).

Studies show that cyclists break traffic laws much less than motorists do. It's just that the types of laws that motorists break are seen as normal. If you actually go below the speed limit you will be the significant outlier.

Comment Re:I told you so. (Score 4, Informative) 54

I kinda hate this thought. If you've ever used Photoshop for anything more than cropping images, the Gimp does not compare one bit. Lack of bit depth, spot color work, adjustment layers are non-fancy things that have been in Photoshop for 20+ years and are /still/ missing from Gimp.

Now, there are paid-for tools that are serious competitors for Photoshop -- like Afinity that are growing in popularity. And they don't require subscription to use either...

Comment Re:Is that description correct? (Score 1) 114

Yeah, except it's not the hotel's DHCP server that would need to be attacked -- it would have to be the place where your VPN tunnel terminates. The VPN server, in most implementations, hands out IP address (and other configuration data) via DHCP. The theory is that if the DHCP server is hijacked within your company's network that hosts the VPN server, that they could have some traffic (like www.amazon.com) NOT go through the VPN. This would also then require somebody on the untrusted network (your hotel network) to then sniff your packets to see the traffic -- if it was unencrypted.

The routes from your local DHCP server (hotel network) would be ignored in MOST vpn setups, besides the encrypted VPN traffic itself.

Comment Re: Every single vpn is fuuucked (Score 2) 114

Very few enterprise VPN servers use DHCP servers on the network (Cisco, Juniper, F5, PaloAlto, etc.) -- but rather use their own DHCP pools that they manage internally to hand out addresses and scopes. I believe Microsoft's uses the DHCP server from Active Directory, but I can't think of any of the larger VPN concentrators that do. This attack seems to be extremely nuanced.

By the way, there is a LOT of security professionals that still setup their VPN's so they only transport traffic that is destine to their inside or DMZ networks. They send out routes so that just their inside IPs get routed over the VPN. The running theory is that "bad traffic" will go out the public network and protect their inside network a bit more, and it also helps offload consumer traffic like youtube and netflix from going across their VPN. Most people have no idea that this is an option and assume that if they are on their corporate VPN they are completely protected.

Slashdot Top Deals

(null cookie; hope that's ok)

Working...