Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Submission + - Russian XMPP/Jabber Service Wiretapped in Germany (valdikss.org.ru)

An anonymous reader writes: IT security researcher ValdikSS shares his discovery that the largest Russian XMPP (Jabber) messaging service has been under covert wiretapping via MITM of all encrypted connections, supposedly by German police, implemented by hosting providers Hetzner and Linode. This has been made possible by fraudulently obtaining a Let's Encrypt certificate in the name of the actual servers. The attack was discovered when said certificate has expired.

Comment Definitely Not Aliens (Score 1) 86

a burst can appear anywhere within the window and will last anywhere from 30 to 300 seconds

Did it occur to them to write down the durations of each and every of these bursts, over a period of time? And possibly write them down as numbers in a row? And then possibly show that to some cryptolinguists and such?...

Comment The only winning move (Score 2) 163

The algorithm effectively strives to ensure that about half of your games end in a defeat. It does this just by nature of adjusting the skill level of your opponents: after a win, next time you get stronger enemies, after a loss, next time some weaker ones. As such, there is no positive feedback for improving your skill in the game. If you play better, it will just throw better opponents at you, so you still lose half of the time. You always have the same Win/Lose ratio, just at the higher levels of play need to sweat more for it. Sorry, but the only winning move is not to play. At least the open-world games such as Planetside 2 feel more fair, in regard that you can pick and choose your battles yourself, and if you get stomped it's solely your fault for going into a particular location against an overwhelming force, or not bringing a good squad composition with you, etc. Not because you just played a bit too well earlier today and an algorithm decided to smack you down.

Comment Re:Very easy to shut down.... (Score 2) 71

Did you actually listen to any speech by him? Here, I uploaded my favorite one (including the off-key background): https://www.youtube.com/watch?...
It is beyond me how is that could be cast as "not great", as not concise, as not factual or not inspiring. When speaking on his key subject there's nobody better than him. Or perhaps you mean something else by "spokesman".

Submission + - Libreboot, others, form a campaign to defend Richard Stallman (libreboot.org)

An anonymous reader writes: Leah Rowe, the project leader at Libreboot, has published a lengthy rebuttal of what she calls a smear campaign against the Free Software activist Richard Stallman. Leah joins the ranks of other bloggers around the web, who take apart the "cancel culture" used against him, post blow-by-blow refuttals of the accusations posed against Stallman and call for justice in the way he is being treated. The open letter in his support has collected more than 4500 signatures by now.

Comment Re:People are building their own sites? (Score 1) 91

PeerTube has already built all of that for you: https://joinpeertube.org/

Also, $15 sounds like an awful lot to pay for a website with little to no visitors. You can rent an entire physical server for about that: https://www.kimsufi.com/us/en/...
Or get a $5 VPS from Linode or DigitalOcean, which would handle the same easily, and then some. AWS is never the cheapest option, and in most cases it's not the best choice for other reasons as well.

Submission + - Ask Slashdot: How would you build a global wireless mesh network? 1

An anonymous reader writes: How would you start a grassroots effort to build a self organizing global radio mesh network where all devices can communicate with all other devices and where there is no central authority. There is nothing in the rules of mathematics or laws of physics that prevents such a system. But how would you break the problem up so it could be crowd funded and sourced? How would you build the radios? And what about government spectrum rules? This seems like biggest blocker. How would you persuade governments to allow for the use of say, 1%, of the spectrum for an unlicensed mesh experiment? In the US it would probably take a Act of Congress to overrule the FCC but a grassroots effort with potential for major technology advances backed by celebrity scientists might be enough to tilt the issue but would there be enough motivation? Thanks for any advice, hints, suggestions, insults, etc.. I love all of you:)

Submission + - A Russian-controlled telecom hijacked 24 Financial Services' Internet Traffic (arstechnica.com)

An anonymous reader writes: On Wednesday, large chunks of network traffic belonging to MasterCard, Visa, and more than two dozen other financial services companies were briefly routed through a Russian government-controlled telecom under unexplained circumstances that renew lingering questions about the trust and reliability of some of the most sensitive Internet communications.

Anomalies in the border gateway protocol—which routes large-scale amounts of traffic among Internet backbones, ISPs, and other large networks—are common and usually the result of human error. While it's possible Wednesday's five- to seven-minute hijack of 36 large network blocks may also have been inadvertent, the high concentration of technology and financial services companies affected made the incident "curious" to engineers at network monitoring service BGPmon. What's more, the way some of the affected networks were redirected indicated their underlying prefixes had been manually inserted into BGP tables, most likely by someone at Rostelecom, the Russian government-controlled telecom that improperly announced ownership of the blocks.

Comment Re:Just as well (Score 2) 368

What makes you think the firmware in your PCIe WiFi card also can't access all main memory

Something which is called an IOMMU.

https://en.wikipedia.org/wiki/...
Memory is protected from malicious devices that are attempting DMA attacks and faulty devices that are attempting errant memory transfers because a device cannot read or write to memory that has not been explicitly allocated (mapped) for it. The memory protection is based on the fact that OS running on the CPU (see figure) exclusively controls both the MMU and the IOMMU. The devices are physically unable to circumvent or corrupt configured memory management tables.

Slashdot Top Deals

It seems that more and more mathematicians are using a new, high level language named "research student".

Working...