Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:Is there any expectation of security? (Score 1) 48

Well, if you send a long URL, that by being long is very difficult to guess, and Twitter convert it to something so small that can be crawled, It is some kind of sharing. They should not be shorting URLs sent as direct messages, as this vulnerability shows, they are breaking the security of the long URL by shortening it.

I am not saying the Google is sharing anything. They give you a long URL that you can send to people you trust, then Twitter shorten it and that short URL can be crawled easily, au contraire of Google URL that is long enough to be treated like a password like authentication.

Comment Re:Is there any expectation of security? (Score 1) 48

Exactly. I know people that send long URLs generated to privately share, like Google photos and send them using Twitter direct messages, believing they are not being shared with the world and they are wrong. Those long URLs know to be relatively secure even by Bruce Schneier are being converted to short ones, and accessible to the public. There is or was a lawsuit related to that

Comment Re:Choice of OS (Score 1) 108

There could be a little truth in that, but no OS make the same mistake of letting the sender of a file decides what is executable or not (sender call it .exe or .scr and it is executable). Only Windows allow the sender to define what icon will be show for a file (sender embed a Word document icon to an executable and that is shown).

There are many ways to make phishing at non Windows users, but then some kind of vulnerability must be used (when opening a document), not a simple stupid trick of sending an executable and people confusing it for other thing. I think the most common one

Comment Re:Is this still true? (Score 1) 391

Trust automatically only the devices detected at boot time. If someone had physical access to replace them before booting then you have worse problems. If your mouse/keyboard break at the same time when plugged (less probable) just press the power button and restart with the new devices. If only one broke then use the other to authorize the replacement

Comment Re:Well, we will be using JRE 8 for a while then (Score 1) 165

Your problem then is not the deprecation of the plugin, your applications will not run either with today browsers and Java 8. I am talking about people using current Java and the plugin. An extension can generate a JNLP file with the applet-desc element and make your applet run outside the browser. Hey current plugin allows you to use JNLP already to describe the applet and when running move the applet outside the browser window, on a different process.

If the applet is interacting with the HTML document, there you are out of luck, but many applets used to manage devices, are just a full page applet, and many of them can run as a JNLP applet.

Slashdot Top Deals

Suggest you just sit there and wait till life gets easier.

Working...