Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Will she pardon here self and him once she gets (Score 1) 592

Spot on. Demonstrating that accountability exists when law enforcement agencies and government officials break the law is the only way they can restore public confidence. Right now, their attempts to wrap themselves in the flag while shitting on the Constitution it represents isn't doing them (or us) any good.

Comment Re:How common is this? (Score 1) 230

Is there any data on how much of an issue this is? Even in a war zone? It seems like in an area of active engagement, stray bullets from a distance would be on the low end of things that cause collateral damage. I mean, we have bombs getting dropped from aircraft and missiles being shot from drones. I'd be willing to bet that even a tiny increase in the specificity of those types of weapons would save far more lives than limiting the lethal range of bullets.

My first thought is this has some interesting applications for things like CQB where not everyone in there is going to be the enemy. Like hostage rescue teams.

Comment Re:Can someone explain why the FBI needs Apple? (Score 1) 339

The FBI has the hardware. At the software level it should be game-over. So what is stopping them from copying the phone's memory, putting it in an emulator or another phone, and brute forcing the 5-digit PIN. Every time it self destructs, they load up another copy and continue until the correct PIN is found. What am I missing here?

Apple has stated that anything with an A7 or newer CPU has a unique code embedded in the hardware that is combined with the PIN to serve as the encryption key. Apple doesn't record the hardware key, and they are the only ones that possess the keys for the software used by the secured enclave in which it resides. So without Apple's help, the DOJ would have to first break into the secure enclave, which I presume is so difficult as to be impractical, and only then could they try the brute-force method you described, which would be much easier.

Comment Re:Now this. This is news! (Score 1) 72

None at all using what does the job for you http://it.slashdot.org/comment...

I couldn't see where the app you referenced sources its block list, but I believe what I use (pfBlockerNG) is probably better.

I maintain that scalability is a big issue you aren't addressing. It's probably fine and certainly better than nothing for one or two Windows desktops, but what about even a small SOHO network that could contain any combination of desktop, mobile, and server operating systems, not to mention embedded devices that may include ffmpeg, like smart TVs and NAS boxes?

Comment Re:Now this. This is news! (Score 3, Informative) 72

Whelp another good reason to have a decent firewall.

Once you put a malformed video file on a system with a vulnerable ffmpeg, and ffmpeg is used to access the file, it makes an outbound connection. Most firewalls are configured to happily pass along anything originated from the inside network.

Slashdot Top Deals

Machines have less problems. I'd like to be a machine. -- Andy Warhol

Working...