Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Thankfully those will be patched right in a jif (Score 3, Informative) 127

I bet virtually all malware on Android originates not from the official store but from idiots downloading and install apks from the wild or some dodgy Chinese app store - "this cracked Candy Crush says it needs access to make calls, send & receive SMS messages, access to my contacts, my Google accounts and email but I really want to play so I'm going to click through this obvious red flag and wonder later why my phone is calling premium numbers in Ouagadougou at 3am and why I have 10 missed calls from Visa loss prevention".

I'm pretty certain Google has systems in place (as well as an after the fact kill function) to eradicate malicious apps that find their way onto the app store. Doubtless there are some there but they're background noise.

Comment Re:Oe noes! A compiler bug! (Score 1) 739

If it's unreachable code then it is indicative of a bug - someone has written code which they *think* does something but doesn't do anything. Now perhaps the programmer deliberately commented something out or surrounded with an "if (false)" block but even so at the very least the compiler should generate a warning and in some cases an error.

Comment Re:You had me at (Score 3, Insightful) 71

You had me at "3D Printed Titanium Jaw Implants". Awesome!

It's cool, but not really news.

I was doing some work in Royal Perth Hospital sometime around 2008, and saw a small, beautifully detailed metal skull on one of the managers' desks. I asked him about it and was told he'd taken an MRI of his own skull and had it printed quarter-sized in sintered titanium. It was the best paperweight I've ever seen.

Cool factor aside, they've been scanning patients' actual bones, optimising them in software and printing titanium replacements (mostly hip joints) there for almost a decade now. There's even a few commercial madical 3d printing companies around AU (Anatomics is one).

It's great that SA is making jaws for people now though.

Comment Re:We should add our own encryption??? (Score 1) 176

False security. If you're paranoid that Dropbox sends your password back then you shouldn't be using it at all. Period. It wouldn't be hard for them to infer that the frequently changing, fixed size random file they were stashing was a truecrypt volume and for them to enumerate the mount points to see what was in it.

Comment Re:We should add our own encryption??? (Score 1) 176

Read my original message. I was never pushing for server side encryption. As far as I'm concerned server side encryption is pretty worthless. It might stop an employee stealing data without authorization but it doesn't stop the government, or any 3rd party armed with a subpoena coming in and taking your stuff. But DropBox has fat clients. They can implement encryption on the client side before it ever reaches the server. They could also make the encryption pluggable so somebody with a hard token, or a fingerprint scanner, or some weird ass corporate policy could plug their own solution in. It doesn't mitigate all attacks naturally but it does protect users from DropBox being compromised, or being served with some narrow or broad demand to access certain data.

Comment Re:We should add our own encryption??? (Score 1) 176

1) Then you put a big warning on the feature making it clear that the user must remember their passphrase. You could also make it only work on a folder explicitly called Protected to hammer this home.

2) Most encryption schemes compress before encrypting. So nothing is lost there. As for de-duplication, I don't see that being a huge concern because a) even if encryption is an option most people won't use it and b) When TFA has dropbox's head honcho saying "We think of encryption beyond that as a users choice."

3) That argument doesn't really fly at all. Security is not an all or nothing thing. Different security serves different purposes and can mitigate different attacks. e.g. encrypting data client side means that if Dropbox's servers were compromised or their users database was stolen that my data is still secure.

Comment Re:We should add our own encryption??? (Score 2) 176

You realise dropbox is free, right?

Basic Dropbox is, none of the other options are. And besides, why is that an excuse? If they can encrypt data as they send it, and as they store it on the cloud, why is it impossible to encrypt it on the client, or provide an API to allow a 3rd party to encrypt it? Furthermore, as it is the paid service that pays their wages, why aren't they implementing a feature that customers, particularly corporates would pay for and which would enhance their reputation for secure storage?

If you want encryption, then fine, do it yourself. You obviously know that your stuff won't be indexable or shareable so won't be calling for support or slagging Dropbox off online when you find indexing and sharing not working.

Well that's a stupid argument right there. I wonder if car companies apply it too - well if you want an airbag in your car why don't you install it yourself? Just because a single individual has the technical wherewithal to implement something doesn't excuse the company for not implementing it in the first place, particularly when it is a feature that many people want.

There's room to suggest Dropbox should offer a pay-for encrypted service. The thing is, no matter how well they do it, it'll always be vulnerable to government interference, and it'll never be fully trusted anyway. BYO means no government interference and trust *for the relatively small number of people who care* without raising the costs too much for the multitudes who don't.

No it won't. The point of a well designed client side encryption is Dropbox simply have no idea what they are storing on their servers. Government can interfere until the cows come home but Dropbox have no idea what is in those files.

Comment We should add our own encryption??? (Score 2, Insightful) 176

Hi Dropbox, stop blaming users. You are in the strongest position possible to offer encryption in Dropbox because it's your software. You know the triggers that cause files to be exchanged. You know the optimal way to minimize network traffic. If you can send and receive files, then why can't you also encrypt / decrypt files in this step? This could be as simple as providing a settings screen where the user enters a passphrase and once enabled all files within a protected folder are encrypted before they leave the client. This encryption could also scramble file names and break up large files into parts to obfuscate their size.

Yes you'd have to warn the user that a protected folder means exactly that and there are restrictions on what you can do with it, e.g. access in some dropbox clients, web browsers, sharing to others. People will get it.

Even better, this encryption / decryption could be thrown open as a pluggable API so 3rd parties could write their own encryption protocols to whatever personal or corporate standard they desired. For transparency the aforementioned passphrase encryption could even be supplied for review.

Same goes for Skydrive, Google Drive etc. There is no excuse for not offering encryption. Not that I'm in the tinfoil hat camp to think this is to facilitate monitoring (although it does). More likely it's because these cloud storage servers use file hashing to spare themselves the bother of storing 1,000,000 copies of the same file. It still sucks though and even if the option is off by default, encryption of at least one folder should be provided.

Comment Re:Why ODF? (Score 1) 164

Saying a file contains Korean is a meaningless statement say unless the doc unambiguously tells you the encoding. Otherwise you're just guessing. If the XML file says it is encoded as US-ASCII but contains shift bits or extended chars then your XML parser would be fully within its rights to throw your non-compliant file out on its ass. If you're lucky it would allow the chars through but it would still be up to your app to heuristically figure out what they meant. So no you can't just shove some Korean in there without dropping a clue of some kind (which isn't the font either).

That is of course why software tends to use Unicode is used these days. A file can unambiguously include the chars it uses and the codepages they come from. How they are stored is where an encoding comes in. UTF-8 tends to be a popular encoding of Unicode because legacy tools tend to cope with it better and the files can be a bit smaller than UTF-16 depending on the contents (amount of markup vs text).

Slashdot Top Deals

To program is to be.

Working...