Please create an account to participate in the Slashdot moderation system


Forgot your password?

Comment: Re:Great idea (Score 1) 66

Given that the store doing the advertising presumably stocks the banned goods, and it's a lot harder to hide physical merchandise in a hurry; I'd assume that the plan depends on the costs of being discovered being less than the value of the advertising, with the cute little trick being there to make it newsworthy, not to fool the cops(even if there were somehow zero machine vision errors or plainclothes cops in Russia; it can't be that uncommon for off-duty cops to wear street clothes; or for the families of police to talk to them).

There is probably a small but nonzero risk that, thanks to the buzz, some humorless enforcer will throw the book at them; but barring that the plan would appear to depend on the actual penalties for 'banned' goods being pretty toothless.

Comment: Perspective? (Score 2) 330

by fuzzyfuzzyfungus (#49790223) Attached to: The Tricky Road Ahead For Android Gets Even Trickier
This article seems(somewhat bizarrely) to be written from the perspective of Google, Inc. but purporting to be talking about "android" and its prospects.

There is certainly a place for analysis of "So, did this 'android' stuff pay off for Google? Was it roughly break-even? A strategic failure?"; but that's quite different than "How is Android doing? What are its prospects?". Conflating the two, though, is confused at best and outright nonsense at worst(especially when examining the 'running Android, possibly even developing it in some way; but not running "Android+Google Play Services"' slice of the market'.

So, is Apple the one actually making money on smartphones? Hell yeah. Has Android been tepid in terms of actually making Google any money? At best; it may well be directly losing money and only appearing to pull its weight as a strategic play. Are the margins for most Android handset manufacturers pretty unexciting compared to Apple? Also hell yeah. However(much like the PC OEMs), that may not actually affect Android: None of the Android OEMs gets the option of joining Apple in making iPhones(except the ones that happen to also have divisions that manufacture components for Apple, like Samsung). Apple has zero interest in letting them do that. So, they can either ship Android handsets with Google, ship AOSP+their own or somebody else's stuff; ship Windows Phone, attempt to build their own OS entirely, or leave the market. Shipping Android handsets with Google isn't a terribly high-margin strategy; but it is so far unclear whether any of the other options are any higher margin.

It is very likely that Google isn't getting nearly as much of what they want from Android as they would like; and Android OEMs certainly aren't earning terribly exciting margins on their devices; but that's their problem. It only becomes Android's problem if Google decides to pull the plug, or if OEMs abandon it in favor of WP or one of the assorted linux-with-stuff-on-top-but-not-android options. So far, WP has gotten fairly good reviews; but struggled for marketshare, and the not-Android Linux derivatives are all writhing around near the noise floor. This isn't obviously a good thing, Android is a pile of mediocrity in quite a few respects, even if some of Google's applications and services for it are pretty good; but it is still the case: Since nobody gets to be an iOS vendor except Apple, and Nokia is MS' special buddy, with other OEMs allowed but sharing a very small pond; 'Android' is a fight over some pretty unexciting margins; but unless a company simply wishes to stop manufacturing smartphones and tablets, it's a fight they'll probably remain in for some time to come.

Sure, I'd love the second coming of WebOS to sweep away the unbelievers and deliver us; but that doesn't appear to be in the cards.

Comment: Re:Go for it (Score 1) 19

by mcgrew (#49784593) Attached to: Survey - George W. Bush more evil than Stalin, Mao, Lenin

I agree he doesn't belong on that list. I do think on the list of America's worst presidents, he'd be at the top of the list.

Ignored warnings from the previous administration, top FBI officials ignored field agents who were warning of something bad, and got our country attacked.

Then he started an incredibly stupid war in Iraq, which led to the rise of ISIS.

Presided over the building of mass surveillance of the American people.

Took office during a boom, left office under the worst economy since the great depression. It's my theory that what caused the ruined economy was fuel prices more than quadrupling during his reign. Buy gas to get to work, or pay the mortgage? Tough choice!

Took office with a balanced budget, left it with the largest deficit in American history. Meanwhile, infrastructure was crumbling and he did nothing.

Now, if the list was of people who did the most harm to our country, he should be on that list. Mao and Pol Pot were very evil men who killed millions of people, but they didn't harm America.

Comment: Seems like bad PR handling... (Score 1) 386

While the people in this video are utter morons(even if you have actually verified the existence of a safety cut-off on a dangerous piece of hardware; Why would you test it on yourself?); Volvo's response seems...tactically unwise.

There may be good reasons for the 'pedestrian detection' feature to be an extra purchase(more sensors, more DSP, recouped development costs, etc.) or it may just be a single bit in the firmware waiting to be flipped in a magic screwdriver upgrade; but either way, "Yeah, we have a feature that would have prevented that accident; but it didn't because we prefer to charge more for it." seems like the sort of statement that is likely to attract the wrong sort of scrutiny.

If you admit to having the mature capability; how long before failing to include it is negligence? Will you be able to keep it as an add-on, rather than a standard feature like antilock braking? Are you absolutely sure that your sales people didn't misrepresent the capabilities of what they sold? and so on.

It seems as though they'd be much better off just issuing a flat 'don't do stupid irresponsible things' and quietly dropped the matter.

Comment: One possible way forward... (Score 2) 117

In thinking about it, and how much of a clusterfuck this is likely to be; it struck me that there might actually be a way to restructure the incentives to provide some kind of hope:

Historically, 'retail' insurance, for individuals and little stuff, was mostly statistical with a side of adversarial: Aside from a few token offers of a free fitbit or whatever, the insurer basically calculates your expected cost as best they can based on your demographics and history and charges you accordingly, and tries to weasel out of anything too unexpectedly expensive.

However, for larger endeavors, (the ones I'm most familiar with are utility and public works projects, there may well be others), sometimes a more collaborative model reigned: the insurer would agree to pay out in the event of accidents, jobsite deaths, and so on, as usual, and the client would pay them for that; but the insurer would also provide guidance to the project, best practices, risk management, specialist expertise on how to minimize the number of expensive fuckups on a given type of project, expertise that the customer might not have, or have at the same level. This was mutually beneficial, since the customer didn't want accidents, the insurer didn't want to pay for accidents, and everyone was happiest if the project went smoothly.

In a case like this; the incentives might align better if the contractor were were delivering both the security and the breach insurance: this would immediately resolve the argument over whether the policyholder was negligent or the insurer needs to pay up: if the IT contractor got the systems hacked through neligence, that's their fault; and if they secured the systems; but a hack was still pulled off, that's where the insurance policy comes in.

This scheme would run the risk of encouraging the vendor to attempt to hide breaches small enough to sweep under the rug; but it would otherwise align incentives reasonably neatly: an IT management/insurance hybrid entity would internalize the cost of the level of security it manages to provide(more secure presumably means greater expenditures on good IT people; but more secure also means lower effective cost of providing insurance, since you can expect fewer, smaller, breaches; and fewer, smaller, claims). If the equilibrium turns out to be 'slack off, pay the claims', that suggests that the fines for shoddy data protection need to be larger; but the arrangement would induce the vendor to keep investing in security until the marginal cost of extra work on IT was higher than the marginal gain from lower expected costs in claims; so the knob to turn to get better security is relatively accessible.

Comment: Re:Seems reasonable (Score 5, Insightful) 117

Not that real world IT systems often ascend to this level of security; but the issue is not going to be clarified by the fact that the analogy to physical security is only partially accurate: everyone accepts that (for a given purpose; bank vaults and nuclear installations get judged differently than houses) there is some level of 'reasonable security', which reflects appropriate caution on the policyholder's part; but is known to be breakable. Materials have limited strength, police have nonzero response time, sensors generate false negatives.

With IT systems(at least at the level of software attacks, if they break in at the silicon level it's another story), there is a platonic essence of 'the secure' floating out there, though generally far, far, far, too expensive, cumbersome, and slow to build to ever see the light of day; and there really isn't the same degree of agreement about what counts as 'secure enough for X' or 'incompetent'. Gross incompetence is something you can identify, and there are various formally proven systems in existence, mostly for the constrained use cases of cost-insensitive customers; but the stuff in the middle is very much up in the air.

Comment: Ahh..a pity. (Score 5, Interesting) 117

For one brief shining moment, I thought that this story was about a health insurance company being dragged into court and beaten on by their insurance company; and my heart leapt and sang with the unalloyed joy of a Norman Rockwell puppy; because that would just be so beautiful.

Alas, 'Cottage Health' is a medical provider of some sort, so such feelings swiftly evaporated.

That aside, this seems like a situation that is simultaneously common sense(Obviously you won't be able to buy 'cyber insurance' that covers egregious negligence, at least not for any price that doesn't reflect an essentially 100% chance of payout, plus the insurer's profit margins and transaction cost); and likely to be an endless nightmare of quibbling about what 'security' is.

We've all seen the long, long, history of attempts to do security-by-checklist, most of which allow you to say that you 'followed industry best practices' by closing the barn door after the horse is long gone, so long as the barn door was constructed with galvanized nails of suitable gauge and is running any antivirus product, efficacy irrelevant. It's not as though 'security' is fundamentally unknowable and intersubjective, man; but it sure isn't something you'd want a lawyer or a layman attempting to boil down into a chunk of contractual language. Barring some miracle of clarity, I suspect that we'll see quite a few dustups that basically involve the insurer's expert witnesses smearing the policyholder's security measures(if they did it by the checklist, the expert witnesses will be snide grey hats who eat 'best practices' for lunch, if they deviated from the checklist, it'll be hardasses on loan from the PCI compliance auditing process, if they implemented a mathematically proven exotic microkernel it'll be somebody asking why Windows Updates weren't being applied in a timely manner); and the policyholder's expert witnesses puffing like salesmen about how strong the security was; and how it must have been an 'advanced persistent threat' to have hacked through such durable code walls.

The fundamental question of 'did you fail to lock the door, or did somebody take a crowbar to it?' is sensible enough in the context of an insurance claim; but rigorously defining what 'locking the door' means in a complex IT operation; and where the boundary between 'incompetence' and 'unavoidable imperfection' lies, is not going to be pretty. My only hope is that if any of these go to jury, the lawyers decide to strike anyone who sounds like they might know something about computers; because it's going to be a long, boring, slugging match of a case.

Comment: Re:This seems foolproof! (Score 1) 94

If I had the slightest confidence that this would actually involve a 'top to bottom' cleaning; I might be more optimistic(though with the caveat that 'top to bottom' purges have the unfortunate side effect of causing massive attrition among your skilled labor, even the stuff not in position to do anything more corrupt than take an extra long lunch break; which could be pretty brutal for an entity that is supposed to do rocket science). As it is, this sounds a lot more like some deck-chair shuffling.

If that is the case, our very own 'Department of Homeland Security' represents a reshuffling at least as large, absorbing as it did various departments under the vague theory that they hadn't been anti-terrorist enough. It...hasn't really been much to write home about.

Comment: Re:Time for 2FA for the local router? (Score 1) 110

I think that you could bodge together a proof of concept with basically any router and either a smartcard reader that supports CAC-style behavior, or any of the fobs that can do keypair auth(I know yubikeys can, I haven't done much poking around); but the one snag is that, to my knowledge, there's nothing (at least nothing remotely standard) that does both robust crypto token and just enough writeable storage for the little bit of configuration data that would allow a user without much technical aptitude to autoconfigure a VPN, or trust of a given certificate, or any other use case that requires both the transmission of a small amount of data and robust authentication.

For myself, I'm interested just because hardware crypto tokens are so strong compared to passwords of any remotely tractable-to-humans complexity, and less vulnerable to untrustworthy clients than doing keypair auth with a private key that lives on a relatively vulnerable computer, rather than never leaving dedicated hardware; but for it to be something useful outside geeks and IT-managed environments, the extra bit of configuration data capability seems like it would be necessary.

Maybe if I were feeling entrepreneurial...

Comment: This seems foolproof! (Score 4, Insightful) 94

So, let me get this straight: your public-sector space program is a fucked-up labyrinth of corruption, fraud, and mismanagement.

You propose to replace it with a sole-source, crony capitalist, 'state corporation', to take advantage of the important synergies between the public sector's capabilities in corruption and mediocrity and the private sector's sophistication in financial and organizational malfeasance?

Christ, guys, if you keep this up I'll start feeling good about US mil/aero procurement practices by comparison...

You can argue about the relative virtues of public sector and private sector agents for various purposes; but there is no lower form of life than the crony capitalist entity when it comes to corruption.

Comment: Re:Time for 2FA for the local router? (Score 1) 110

Two-factor auth is so far ahead of the current situation that the risk of 'what if they try to configure the router from a compromised PC?' probably isn't on the radar.

What I would love to see, though, would be a router that uses some USB or NFC security fob for idiot-proof and robust VPN setups: just imagine: plug the fob into the router, or set it on the NFC pad, press the 'bless' button; and the router would perform the appropriate cryptographic handshaking with the fob, and provide the configuration information for setting up the VPN(url, VPN type, etc.).

Then you bring the fob over to a computer or mobile device, hit 'make it so', and the VPN client reads out the config data, makes the appropriate configuration changes, and the fob authenticates the connection. Quick, trivially easy, much more secure than a password or even a certificate file on a USB drive; and you are neatly tunneled back to your home network regardless of the hostile and untrusted networks you may encounter during the day.

Should you lose the fob; hit the 'unbless all' button and all fobs need to be re-blessed before they can be used(obviously, web or other interfaces to the router could allow more granular and advanced control; but having to re-bless a few fobs is likely to be easier than having to understand a more complex interface for many unsophisticated users, who probably only have a small number of active fobs anyway).

Comment: Re:Not news... Use better passwords. (Score 1) 110

The fact that there are telnet services listening on WAN ports 15 years after OpenSSH became available makes me suspect that nothing short of a vigorous scourging with nuclear fire could solve the utterly lax approach to even rudimentary security in consumer electronics.

Well, that and DRM. Tell 'em that the pirates will steal their precious 'premium content' and suddenly they get real interested in security, albeit more in the 'building prisons' than 'building fortresses' sense of the word.

Comment: Re:Requires... (Score 2) 110

Cable modems are a bit of a special case, and not in a good way. By design, they do what is called "DOCSIS Provisioning". As you might imagine, given that the 'Data over Cable Service Interface Specification' is produced by CableLabs, an industry R&D and standards organization operated by cable companies; the process is designed for the convenience of the service provider, not for the user.

Most cable modems do have some sort of web interface, config settings to fiddle with, etc.; but when you connect one to a cable network, after performing the low-level analog black magic required to get a working digital channel up, the modem makes a DHCP request, which the operator CMTS responds to with an IP and a TFTP server address from which the modem downloads a configuration file. The modem then applies that config file, ignoring any manual configuration made, and operates accordingly.

If you fancy a look at the gory details, Here are some links; and there is a software package for playing with being the party doing the provisioning. Punchline is, though, that a successful cable modem connection more or less implies that the cable modem will be operating according to the provider's configuration for the duration of the connection. Depending on whether or not your ISP is a dick about it, you may or may not lose access to http status pages, SNMP, and any other features the modem possesses; but that's all their call. A disconnected cable modem isn't much use; but it will generally show you whatever its firmware has to offer.

Make it right before you make it faster.